PATH:
var
/
log
/
azure
/
Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux
2022-02-04T14:24:36.605786Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 3] 2022-02-04T14:24:36.606530Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: notinstalled 2022-02-04T14:24:36.611143Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Downloading extension package: https://rdfepirv2am3prdstr06.blob.core.windows.net/c6638898a03248619c8b0f4cbe30030c/Microsoft.Azure.NetworkWatcher__NetworkWatcherAgentLinux__1.4.2059.1 2022-02-04T14:24:36.809051Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Unzipping extension package: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux__1.4.2059.1.zip 2022-02-04T14:24:37.280740Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Initializing extension Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1 2022-02-04T14:24:37.286903Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-02-04T14:24:37.287509Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Install extension [./install.sh install] 2022-02-04T14:24:37.288236Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh install with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-02-04T14:24:39.295865Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh install [stdout] Checking if system is supported This system is supported Installing Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes [stderr] n 0 fi return 1 } extensionOperationFailed() { if [ "$1" != "0" ] && [ "$1" != "NOT_RUN" ]; then return 1 fi return 0 } forceKillOldAgent() { echo "Force kill all NetworkWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-02-04T14:24:39.298407Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-02-04T14:24:39.299098Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-02-04T14:24:39.300194Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-02-04T14:24:48.315637Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-02-04T14:37:03.623660Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 1] 2022-02-04T14:37:03.626948Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-02-04T14:37:03.627219Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-02-04T14:37:03.627759Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-02-04T14:37:03.632847Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-02-04T14:37:03.633992Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-02-04T14:37:12.652638Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-02-04T14:39:59.118119Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 2] 2022-02-04T14:39:59.123127Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-02-04T14:39:59.123425Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-02-04T14:39:59.123977Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-02-04T14:39:59.124791Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-02-04T14:39:59.125650Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-02-04T14:40:08.141323Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-02-05T08:03:59.475065Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 3] 2022-02-05T08:03:59.476289Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-02-05T08:03:59.476556Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-02-05T08:03:59.477105Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-02-05T08:03:59.477508Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-02-05T08:03:59.478364Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-02-05T08:04:08.497954Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-02-06T08:04:03.480738Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 4] 2022-02-06T08:04:03.482216Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-02-06T08:04:03.482468Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-02-06T08:04:03.482964Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-02-06T08:04:03.483579Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-02-06T08:04:03.484394Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-02-06T08:04:12.500545Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-02-07T08:08:46.428814Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 5] 2022-02-07T08:08:46.430195Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-02-07T08:08:46.430453Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-02-07T08:08:46.431048Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-02-07T08:08:46.431440Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-02-07T08:08:46.432299Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-02-07T08:08:55.451991Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-02-08T08:09:08.572824Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 6] 2022-02-08T08:09:08.574214Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-02-08T08:09:08.574546Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-02-08T08:09:08.575086Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-02-08T08:09:08.575502Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-02-08T08:09:08.576247Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-02-08T08:09:17.596070Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-02-09T08:03:09.166294Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 7] 2022-02-09T08:03:09.167525Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-02-09T08:03:09.167780Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-02-09T08:03:09.168335Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-02-09T08:03:09.168724Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-02-09T08:03:09.169526Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-02-09T08:03:18.190251Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-02-10T08:05:35.860490Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 8] 2022-02-10T08:05:35.861984Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-02-10T08:05:35.862328Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-02-10T08:05:35.862829Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-02-10T08:05:35.863254Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-02-10T08:05:35.868179Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-02-10T08:05:44.884445Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-02-11T08:02:05.534419Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 9] 2022-02-11T08:02:05.539450Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-02-11T08:02:05.539750Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-02-11T08:02:05.540261Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-02-11T08:02:05.540683Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-02-11T08:02:05.541565Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-02-11T08:02:14.557520Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-02-12T08:07:45.199433Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 10] 2022-02-12T08:07:45.200750Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-02-12T08:07:45.201057Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-02-12T08:07:45.201632Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-02-12T08:07:45.202032Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-02-12T08:07:45.202894Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-02-12T08:07:54.222912Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-02-13T08:05:52.998891Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 11] 2022-02-13T08:05:53.003571Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-02-13T08:05:53.007618Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-02-13T08:05:53.008235Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-02-13T08:05:53.008772Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-02-13T08:05:53.009817Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-02-13T08:06:02.026193Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-02-14T08:03:30.885603Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 12] 2022-02-14T08:03:30.886841Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-02-14T08:03:30.887098Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-02-14T08:03:30.891535Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-02-14T08:03:30.891981Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-02-14T08:03:30.892819Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-02-14T08:03:39.908319Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-02-15T08:09:53.493081Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 13] 2022-02-15T08:09:53.494385Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-02-15T08:09:53.498513Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-02-15T08:09:53.499060Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-02-15T08:09:53.499462Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-02-15T08:09:53.500339Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-02-15T08:10:02.516126Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-02-16T08:02:07.045736Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 14] 2022-02-16T08:02:07.046924Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-02-16T08:02:07.047368Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-02-16T08:02:07.047901Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-02-16T08:02:07.048371Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-02-16T08:02:07.049245Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-02-16T08:02:16.075198Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-02-17T08:09:59.543167Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 15] 2022-02-17T08:09:59.544439Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-02-17T08:09:59.544710Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-02-17T08:09:59.545237Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-02-17T08:09:59.545679Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-02-17T08:09:59.546540Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-02-17T08:10:08.566222Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-02-18T08:02:16.581432Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 16] 2022-02-18T08:02:16.582646Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-02-18T08:02:16.582905Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-02-18T08:02:16.583443Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-02-18T08:02:16.583847Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-02-18T08:02:16.584844Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-02-18T08:02:25.603119Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-02-19T08:02:38.737801Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 17] 2022-02-19T08:02:38.742850Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-02-19T08:02:38.743119Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-02-19T08:02:38.743616Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-02-19T08:02:38.744069Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-02-19T08:02:38.745088Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-02-19T08:02:47.760089Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-02-20T08:01:22.429005Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 18] 2022-02-20T08:01:22.430815Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-02-20T08:01:22.431076Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-02-20T08:01:22.431664Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-02-20T08:01:22.432642Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-02-20T08:01:22.433643Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-02-20T08:01:31.453585Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-02-21T08:08:10.475964Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 19] 2022-02-21T08:08:10.477155Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-02-21T08:08:10.477443Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-02-21T08:08:10.478010Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-02-21T08:08:10.478560Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-02-21T08:08:10.483549Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-02-21T08:08:19.499803Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-02-22T08:11:17.221406Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 20] 2022-02-22T08:11:17.222611Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-02-22T08:11:17.222865Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-02-22T08:11:17.223399Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-02-22T08:11:17.224162Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-02-22T08:11:17.228744Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-02-22T08:11:26.244843Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-02-22T18:37:25.915281Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 12] 2022-02-22T18:37:25.926556Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-02-22T18:37:25.926794Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-02-22T18:37:25.934734Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-02-22T18:37:25.936767Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-02-22T18:37:25.937483Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-02-22T18:37:34.966921Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-02-23T08:09:38.306070Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 13] 2022-02-23T08:09:38.307212Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-02-23T08:09:38.307494Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-02-23T08:09:38.312350Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-02-23T08:09:38.312781Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-02-23T08:09:38.313590Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-02-23T08:09:47.330104Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-02-24T08:06:28.026332Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 14] 2022-02-24T08:06:28.027556Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-02-24T08:06:28.027808Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-02-24T08:06:28.028291Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-02-24T08:06:28.028724Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-02-24T08:06:28.033447Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-02-24T08:06:37.050135Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-02-25T02:08:15.756044Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 14] 2022-02-25T02:08:15.758151Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-02-25T02:08:15.761232Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-02-25T02:08:15.761861Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-02-25T02:08:15.762515Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-02-25T02:08:15.763631Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-02-25T02:08:24.777184Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-02-25T08:09:25.072373Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 15] 2022-02-25T08:09:25.073666Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-02-25T08:09:25.073972Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-02-25T08:09:25.074475Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-02-25T08:09:25.074911Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-02-25T08:09:25.075882Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-02-25T08:09:34.091607Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-02-26T08:05:13.998458Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 16] 2022-02-26T08:05:13.999676Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-02-26T08:05:14.000169Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-02-26T08:05:14.004926Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-02-26T08:05:14.006535Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-02-26T08:05:14.007420Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-02-26T08:05:23.023123Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-02-27T08:01:52.937896Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 17] 2022-02-27T08:01:52.939076Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-02-27T08:01:52.939677Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-02-27T08:01:52.940182Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-02-27T08:01:52.940578Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-02-27T08:01:52.941570Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-02-27T08:02:01.961284Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-02-28T08:07:38.232741Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 18] 2022-02-28T08:07:38.233975Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-02-28T08:07:38.234264Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-02-28T08:07:38.234813Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-02-28T08:07:38.235597Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-02-28T08:07:38.242915Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-02-28T08:07:47.259593Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-03-01T08:02:21.425521Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 19] 2022-03-01T08:02:21.426826Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-03-01T08:02:21.427100Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-03-01T08:02:21.427663Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-03-01T08:02:21.428465Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-03-01T08:02:21.429456Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-03-01T08:02:30.448451Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-03-02T08:03:08.850462Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 20] 2022-03-02T08:03:08.855633Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-03-02T08:03:08.855918Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-03-02T08:03:08.856546Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-03-02T08:03:08.857026Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-03-02T08:03:08.857799Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-03-02T08:03:17.873759Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-03-03T08:08:57.572640Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 21] 2022-03-03T08:08:57.573801Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-03-03T08:08:57.574087Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-03-03T08:08:57.574574Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-03-03T08:08:57.575005Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-03-03T08:08:57.575740Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-03-03T08:09:06.594306Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-03-04T08:09:42.809314Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 22] 2022-03-04T08:09:42.810506Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-03-04T08:09:42.810772Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-03-04T08:09:42.811307Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-03-04T08:09:42.811705Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-03-04T08:09:42.816477Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-03-04T08:09:51.832626Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-03-05T08:08:44.847806Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 23] 2022-03-05T08:08:44.849090Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-03-05T08:08:44.849381Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-03-05T08:08:44.849864Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-03-05T08:08:44.850291Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-03-05T08:08:44.851054Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-03-05T08:08:53.866982Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-03-06T08:05:23.035388Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 24] 2022-03-06T08:05:23.036649Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-03-06T08:05:23.036942Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-03-06T08:05:23.037499Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-03-06T08:05:23.037908Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-03-06T08:05:23.042678Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-03-06T08:05:32.058635Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-03-07T08:01:39.945609Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 25] 2022-03-07T08:01:39.946780Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-03-07T08:01:39.947060Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-03-07T08:01:39.947554Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-03-07T08:01:39.948251Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-03-07T08:01:39.949095Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-03-07T08:01:48.969088Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-03-07T19:30:21.770830Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 25] 2022-03-07T19:30:21.772161Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-03-07T19:30:21.772426Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-03-07T19:30:21.772957Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-03-07T19:30:21.773554Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-03-07T19:30:21.778340Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-03-07T19:30:30.793469Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-03-08T08:02:08.783730Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 26] 2022-03-08T08:02:08.784979Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-03-08T08:02:08.785230Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-03-08T08:02:08.785745Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-03-08T08:02:08.786182Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-03-08T08:02:08.786935Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-03-08T08:02:17.804545Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-03-09T08:07:17.029150Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 27] 2022-03-09T08:07:17.030464Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-03-09T08:07:17.030733Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-03-09T08:07:17.031246Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-03-09T08:07:17.031845Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-03-09T08:07:17.032806Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-03-09T08:07:26.052638Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-03-10T08:01:36.058468Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 28] 2022-03-10T08:01:36.060240Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-03-10T08:01:36.064423Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-03-10T08:01:36.064902Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-03-10T08:01:36.065419Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-03-10T08:01:36.066219Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-03-10T08:01:45.082802Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-03-11T08:07:15.816387Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 29] 2022-03-11T08:07:15.817719Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-03-11T08:07:15.818014Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-03-11T08:07:15.822314Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-03-11T08:07:15.822760Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-03-11T08:07:15.823537Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-03-11T08:07:24.839066Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-03-12T08:01:59.156041Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 30] 2022-03-12T08:01:59.161630Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-03-12T08:01:59.161961Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-03-12T08:01:59.162427Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-03-12T08:01:59.162939Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-03-12T08:01:59.163810Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-03-12T08:02:08.179449Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-03-13T08:05:24.339168Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 31] 2022-03-13T08:05:24.340466Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-03-13T08:05:24.340736Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-03-13T08:05:24.341211Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-03-13T08:05:24.342181Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-03-13T08:05:24.342996Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-03-13T08:05:33.361500Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-03-14T08:10:55.206045Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 32] 2022-03-14T08:10:55.207366Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-03-14T08:10:55.207634Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-03-14T08:10:55.208172Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-03-14T08:10:55.208588Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-03-14T08:10:55.209440Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-03-14T08:11:04.231011Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-03-15T08:08:00.808127Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 33] 2022-03-15T08:08:00.813277Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-03-15T08:08:00.813542Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-03-15T08:08:00.814079Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-03-15T08:08:00.814550Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-03-15T08:08:00.815767Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-03-15T08:08:09.831593Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-03-16T08:10:09.962104Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 34] 2022-03-16T08:10:09.967293Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-03-16T08:10:09.967557Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-03-16T08:10:09.968129Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-03-16T08:10:09.968544Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-03-16T08:10:09.969498Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-03-16T08:10:18.985448Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-03-17T08:04:42.396649Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 35] 2022-03-17T08:04:42.397959Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-03-17T08:04:42.402092Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-03-17T08:04:42.402630Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-03-17T08:04:42.403228Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-03-17T08:04:42.404064Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-03-17T08:04:51.419021Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-03-18T08:03:39.054679Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 36] 2022-03-18T08:03:39.056045Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-03-18T08:03:39.056309Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-03-18T08:03:39.060583Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-03-18T08:03:39.061134Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-03-18T08:03:39.061934Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-03-18T08:03:48.077343Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-03-19T08:04:20.223735Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 37] 2022-03-19T08:04:20.225085Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-03-19T08:04:20.225349Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-03-19T08:04:20.225837Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-03-19T08:04:20.226274Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-03-19T08:04:20.227037Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-03-19T08:04:29.246103Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-03-20T08:05:30.065339Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 38] 2022-03-20T08:05:30.072178Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-03-20T08:05:30.072578Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-03-20T08:05:30.073067Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-03-20T08:05:30.073745Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-03-20T08:05:30.074556Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-03-20T08:05:39.091887Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-03-21T08:08:14.939135Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 39] 2022-03-21T08:08:14.944469Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-03-21T08:08:14.944741Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-03-21T08:08:14.945278Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-03-21T08:08:14.945919Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-03-21T08:08:14.947167Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-03-21T08:08:23.962657Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-03-22T08:04:05.683652Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 40] 2022-03-22T08:04:05.688760Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-03-22T08:04:05.689018Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-03-22T08:04:05.689516Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-03-22T08:04:05.689949Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-03-22T08:04:05.690749Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-03-22T08:04:14.705477Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-03-23T08:05:41.838098Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 41] 2022-03-23T08:05:41.843305Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-03-23T08:05:41.843618Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-03-23T08:05:41.844118Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-03-23T08:05:41.844576Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-03-23T08:05:41.845414Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-03-23T08:05:50.860563Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-03-24T08:06:08.241770Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 42] 2022-03-24T08:06:08.246813Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-03-24T08:06:08.247112Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-03-24T08:06:08.247957Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-03-24T08:06:08.248370Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-03-24T08:06:08.249170Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-03-24T08:06:17.264695Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-03-25T08:02:21.538350Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 43] 2022-03-25T08:02:21.539601Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-03-25T08:02:21.539858Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-03-25T08:02:21.540388Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-03-25T08:02:21.540858Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-03-25T08:02:21.541708Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-03-25T08:02:30.557794Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-03-26T08:05:37.192185Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 44] 2022-03-26T08:05:37.193722Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-03-26T08:05:37.194087Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-03-26T08:05:37.194658Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-03-26T08:05:37.195106Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-03-26T08:05:37.195888Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-03-26T08:05:46.216276Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-03-27T08:10:11.319924Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 45] 2022-03-27T08:10:11.321226Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-03-27T08:10:11.321476Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-03-27T08:10:11.321994Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-03-27T08:10:11.326151Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-03-27T08:10:11.327121Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-03-27T08:10:20.345352Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-03-28T08:03:31.523926Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 46] 2022-03-28T08:03:31.525197Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-03-28T08:03:31.525452Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-03-28T08:03:31.526189Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-03-28T08:03:31.526727Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-03-28T08:03:31.527685Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-03-28T08:03:40.547292Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-03-29T08:06:53.828115Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 47] 2022-03-29T08:06:53.829404Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-03-29T08:06:53.833383Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-03-29T08:06:53.833911Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-03-29T08:06:53.834439Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-03-29T08:06:53.835434Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-03-29T08:07:02.851030Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2022-03-30T02:07:48.804582Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 47] 2022-03-30T02:07:48.806329Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-03-30T02:07:48.806599Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-03-30T02:07:48.807205Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-03-30T02:07:48.807854Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-03-30T02:07:48.812595Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-03-30T02:07:57.832383Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-03-30T08:09:48.411551Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 48] 2022-03-30T08:09:48.413199Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-03-30T08:09:48.413460Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-03-30T08:09:48.413949Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-03-30T08:09:48.414847Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-03-30T08:09:48.415814Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-03-30T08:09:57.437492Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-03-31T08:02:23.263103Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 49] 2022-03-31T08:02:23.264524Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-03-31T08:02:23.264781Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-03-31T08:02:23.265306Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-03-31T08:02:23.265860Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-03-31T08:02:23.266792Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-03-31T08:02:32.291329Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-04-01T08:04:34.336453Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 50] 2022-04-01T08:04:34.337804Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-04-01T08:04:34.338073Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-04-01T08:04:34.338573Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-04-01T08:04:34.352507Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-04-01T08:04:34.353598Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-04-01T08:04:43.371097Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-04-02T08:03:20.657250Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 51] 2022-04-02T08:03:20.658591Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-04-02T08:03:20.658846Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-04-02T08:03:20.659375Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-04-02T08:03:20.659803Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-04-02T08:03:20.660606Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-04-02T08:03:29.691302Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-04-03T08:06:17.227406Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 52] 2022-04-03T08:06:17.228900Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-04-03T08:06:17.229159Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-04-03T08:06:17.229686Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-04-03T08:06:17.234115Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-04-03T08:06:17.234964Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-04-03T08:06:26.255622Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-04-04T08:08:07.916875Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 53] 2022-04-04T08:08:07.921954Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-04-04T08:08:07.922290Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-04-04T08:08:07.923201Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-04-04T08:08:07.923673Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-04-04T08:08:07.924465Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-04-04T08:08:16.942820Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-04-04T22:10:05.056487Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 53] 2022-04-04T22:10:05.058154Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-04-04T22:10:05.058406Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-04-04T22:10:05.058903Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-04-04T22:10:05.059863Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-04-04T22:10:05.060695Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-04-04T22:10:14.078609Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-04-05T08:10:49.694943Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 54] 2022-04-05T08:10:49.696378Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-04-05T08:10:49.700257Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-04-05T08:10:49.700735Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-04-05T08:10:49.701170Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-04-05T08:10:49.701923Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-04-05T08:10:58.720939Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-04-06T08:09:05.563545Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 55] 2022-04-06T08:09:05.564833Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-04-06T08:09:05.565108Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-04-06T08:09:05.565623Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-04-06T08:09:05.566215Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-04-06T08:09:05.567038Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-04-06T08:09:14.584846Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-04-07T08:06:18.826760Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 56] 2022-04-07T08:06:18.831971Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-04-07T08:06:18.832486Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-04-07T08:06:18.833035Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-04-07T08:06:18.833491Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-04-07T08:06:18.834503Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-04-07T08:06:27.854598Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-04-08T08:04:39.883588Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 57] 2022-04-08T08:04:39.885048Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-04-08T08:04:39.885315Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-04-08T08:04:39.885813Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-04-08T08:04:39.886271Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-04-08T08:04:39.887006Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-04-08T08:04:48.917204Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-04-09T08:10:26.418728Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 58] 2022-04-09T08:10:26.420226Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-04-09T08:10:26.420731Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-04-09T08:10:26.425230Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-04-09T08:10:26.425823Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-04-09T08:10:26.426875Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-04-09T08:10:35.448581Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-04-10T08:10:21.961994Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 59] 2022-04-10T08:10:21.963320Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-04-10T08:10:21.963610Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-04-10T08:10:21.964111Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-04-10T08:10:21.964896Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-04-10T08:10:21.969594Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-04-10T08:10:30.987428Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-04-11T08:09:21.185495Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 60] 2022-04-11T08:09:21.186900Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-04-11T08:09:21.187160Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-04-11T08:09:21.187635Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-04-11T08:09:21.188099Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-04-11T08:09:21.188870Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-04-11T08:09:30.209484Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-04-12T08:04:02.180482Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 61] 2022-04-12T08:04:02.185794Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-04-12T08:04:02.186049Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-04-12T08:04:02.186601Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-04-12T08:04:02.187009Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-04-12T08:04:02.187763Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-04-12T08:04:11.209073Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-04-13T08:07:30.014775Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 62] 2022-04-13T08:07:30.016172Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-04-13T08:07:30.016440Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-04-13T08:07:30.017007Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-04-13T08:07:30.017453Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-04-13T08:07:30.019407Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-04-13T08:07:39.049942Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-04-14T08:09:22.779394Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 63] 2022-04-14T08:09:22.780654Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-04-14T08:09:22.780905Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-04-14T08:09:22.781656Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-04-14T08:09:22.782639Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-04-14T08:09:22.783445Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-04-14T08:09:31.801763Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-04-15T08:03:29.954143Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 64] 2022-04-15T08:03:29.955447Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-04-15T08:03:29.955717Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-04-15T08:03:29.961041Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-04-15T08:03:29.961552Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-04-15T08:03:29.970542Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-04-15T08:03:38.988361Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-04-16T08:06:49.729374Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 65] 2022-04-16T08:06:49.730685Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-04-16T08:06:49.730940Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-04-16T08:06:49.731436Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-04-16T08:06:49.735776Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-04-16T08:06:49.736632Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-04-16T08:06:58.754277Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-04-17T08:10:11.146688Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 66] 2022-04-17T08:10:11.151865Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-04-17T08:10:11.152159Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-04-17T08:10:11.152711Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-04-17T08:10:11.153156Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-04-17T08:10:11.154195Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-04-17T08:10:20.175407Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-04-18T08:08:16.041832Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 67] 2022-04-18T08:08:16.046959Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-04-18T08:08:16.047252Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-04-18T08:08:16.047750Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-04-18T08:08:16.048204Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-04-18T08:08:16.049004Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-04-18T08:08:25.076352Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-04-19T08:09:41.852295Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 68] 2022-04-19T08:09:41.853578Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-04-19T08:09:41.853827Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-04-19T08:09:41.854370Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-04-19T08:09:41.854859Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-04-19T08:09:41.859612Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-04-19T08:09:50.877490Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-04-20T08:07:56.525905Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 69] 2022-04-20T08:07:56.527235Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-04-20T08:07:56.527523Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-04-20T08:07:56.528019Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-04-20T08:07:56.528475Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-04-20T08:07:56.529316Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-04-20T08:08:05.546974Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-04-21T08:06:28.413566Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 70] 2022-04-21T08:06:28.415031Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-04-21T08:06:28.415297Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-04-21T08:06:28.415798Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-04-21T08:06:28.416623Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-04-21T08:06:28.417474Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-04-21T08:06:37.438089Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-04-22T08:03:21.445411Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 71] 2022-04-22T08:03:21.446668Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-04-22T08:03:21.446916Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-04-22T08:03:21.451313Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-04-22T08:03:21.452165Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-04-22T08:03:21.452917Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-04-22T08:03:30.471680Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-04-23T08:10:34.952668Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 72] 2022-04-23T08:10:34.954311Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-04-23T08:10:34.954563Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-04-23T08:10:34.955094Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-04-23T08:10:34.955509Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-04-23T08:10:34.956267Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-04-23T08:10:43.980381Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-04-24T08:01:54.212627Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 73] 2022-04-24T08:01:54.213938Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-04-24T08:01:54.214197Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-04-24T08:01:54.214682Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-04-24T08:01:54.215166Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-04-24T08:01:54.216087Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-04-24T08:02:03.234851Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-04-25T08:09:37.319090Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 74] 2022-04-25T08:09:37.320422Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-04-25T08:09:37.320675Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-04-25T08:09:37.321179Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-04-25T08:09:37.321642Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-04-25T08:09:37.322460Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-04-25T08:09:46.342902Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-04-26T08:10:33.832076Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 75] 2022-04-26T08:10:33.833585Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-04-26T08:10:33.833840Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-04-26T08:10:33.834434Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-04-26T08:10:33.835448Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-04-26T08:10:33.836343Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-04-26T08:10:42.862274Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-04-27T08:05:05.268724Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 76] 2022-04-27T08:05:05.269978Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-04-27T08:05:05.270230Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-04-27T08:05:05.271036Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-04-27T08:05:05.271453Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-04-27T08:05:05.276188Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-04-27T08:05:14.293672Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-04-28T08:04:02.185613Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 77] 2022-04-28T08:04:02.190782Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-04-28T08:04:02.191037Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-04-28T08:04:02.191570Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-04-28T08:04:02.192642Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-04-28T08:04:02.193513Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-04-28T08:04:11.240828Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-04-29T08:10:48.224630Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 78] 2022-04-29T08:10:48.225949Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-04-29T08:10:48.226249Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-04-29T08:10:48.230666Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-04-29T08:10:48.231296Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-04-29T08:10:48.232201Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-04-29T08:10:57.249709Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-04-30T08:10:55.960094Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 79] 2022-04-30T08:10:55.964360Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-04-30T08:10:55.967552Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-04-30T08:10:55.968501Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-04-30T08:10:55.986261Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-04-30T08:10:55.987196Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-04-30T08:11:05.004730Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-05-01T08:09:02.423179Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 80] 2022-05-01T08:09:02.424459Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-05-01T08:09:02.428691Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-05-01T08:09:02.429227Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-05-01T08:09:02.429661Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-05-01T08:09:02.430437Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-05-01T08:09:11.452066Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-05-02T08:07:44.846750Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 81] 2022-05-02T08:07:44.851905Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-05-02T08:07:44.852162Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-05-02T08:07:44.852696Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-05-02T08:07:44.853233Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-05-02T08:07:44.854122Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-05-02T08:07:53.878951Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-05-03T08:06:13.725466Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 82] 2022-05-03T08:06:13.726772Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-05-03T08:06:13.727035Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-05-03T08:06:13.727559Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-05-03T08:06:13.727981Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-05-03T08:06:13.728735Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-05-03T08:06:22.749083Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-05-04T08:08:14.177373Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 83] 2022-05-04T08:08:14.178665Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-05-04T08:08:14.178921Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-05-04T08:08:14.183430Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-05-04T08:08:14.184077Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-05-04T08:08:14.184841Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-05-04T08:08:23.216569Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-05-05T08:05:26.584752Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 84] 2022-05-05T08:05:26.589885Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-05-05T08:05:26.590140Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-05-05T08:05:26.590668Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-05-05T08:05:26.591415Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-05-05T08:05:26.592194Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-05-05T08:05:35.613601Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-05-06T02:07:31.154595Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 84] 2022-05-06T02:07:31.157021Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-05-06T02:07:31.157279Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-05-06T02:07:31.157780Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-05-06T02:07:31.158494Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-05-06T02:07:31.163062Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-05-06T02:07:40.179618Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-05-06T08:01:08.372347Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 85] 2022-05-06T08:01:08.373812Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-05-06T08:01:08.374116Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-05-06T08:01:08.374616Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-05-06T08:01:08.375079Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-05-06T08:01:08.375961Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-05-06T08:01:17.400702Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-05-07T08:07:17.438398Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 86] 2022-05-07T08:07:17.439687Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-05-07T08:07:17.443745Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-05-07T08:07:17.444359Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-05-07T08:07:17.445032Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-05-07T08:07:17.445874Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-05-07T08:07:26.462798Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-05-08T08:02:41.002535Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 87] 2022-05-08T08:02:41.008112Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-05-08T08:02:41.008402Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-05-08T08:02:41.008916Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-05-08T08:02:41.009392Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-05-08T08:02:41.010138Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-05-08T08:02:50.030662Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-05-09T08:06:16.655739Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 88] 2022-05-09T08:06:16.657101Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-05-09T08:06:16.657384Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-05-09T08:06:16.657913Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-05-09T08:06:16.658300Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-05-09T08:06:16.659096Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-05-09T08:06:25.679024Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-05-10T08:09:19.387494Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 89] 2022-05-10T08:09:19.388953Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-05-10T08:09:19.389262Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-05-10T08:09:19.389781Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-05-10T08:09:19.395347Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-05-10T08:09:19.396369Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-05-10T08:09:28.419651Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-05-11T08:04:06.939912Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 90] 2022-05-11T08:04:06.941266Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-05-11T08:04:06.941520Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-05-11T08:04:06.942020Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-05-11T08:04:06.942473Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-05-11T08:04:06.943281Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-05-11T08:04:15.959829Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-05-12T02:11:32.301350Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 90] 2022-05-12T02:11:32.302637Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-05-12T02:11:32.302904Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-05-12T02:11:32.307005Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-05-12T02:11:32.307751Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-05-12T02:11:32.308520Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-05-12T02:11:41.326166Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-05-12T08:07:25.143210Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 91] 2022-05-12T08:07:25.144831Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-05-12T08:07:25.145118Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-05-12T08:07:25.145619Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-05-12T08:07:25.146400Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-05-12T08:07:25.147164Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-05-12T08:07:34.175623Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-05-13T08:05:51.743183Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 92] 2022-05-13T08:05:51.744508Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-05-13T08:05:51.744773Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-05-13T08:05:51.745492Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-05-13T08:05:51.750036Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-05-13T08:05:51.750862Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-05-13T08:06:00.767813Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-05-14T02:08:02.780561Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 92] 2022-05-14T02:08:02.785589Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-05-14T02:08:02.785846Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-05-14T02:08:02.786387Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-05-14T02:08:02.787168Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-05-14T02:08:02.788339Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-05-14T02:08:11.810836Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-05-14T08:01:40.324136Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 93] 2022-05-14T08:01:40.325876Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-05-14T08:01:40.326207Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-05-14T08:01:40.326737Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-05-14T08:01:40.327176Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-05-14T08:01:40.331987Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-05-14T08:01:49.349912Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-05-15T08:10:54.779715Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 94] 2022-05-15T08:10:54.781038Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-05-15T08:10:54.781312Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-05-15T08:10:54.785618Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-05-15T08:10:54.786123Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-05-15T08:10:54.786860Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-05-15T08:11:03.803590Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-05-16T08:07:23.055103Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 95] 2022-05-16T08:07:23.056430Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-05-16T08:07:23.056688Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-05-16T08:07:23.057234Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-05-16T08:07:23.057646Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-05-16T08:07:23.062767Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-05-16T08:07:32.081015Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-05-17T08:05:18.054850Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 96] 2022-05-17T08:05:18.056171Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-05-17T08:05:18.056463Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-05-17T08:05:18.056998Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-05-17T08:05:18.057387Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-05-17T08:05:18.062336Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-05-17T08:05:27.080816Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-05-18T08:03:33.006138Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 97] 2022-05-18T08:03:33.007388Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-05-18T08:03:33.007645Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-05-18T08:03:33.008225Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-05-18T08:03:33.008639Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-05-18T08:03:33.009425Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-05-18T08:03:42.027674Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-05-19T08:08:31.877195Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 98] 2022-05-19T08:08:31.878506Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-05-19T08:08:31.878762Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-05-19T08:08:31.879315Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-05-19T08:08:31.879774Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-05-19T08:08:31.884513Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-05-19T08:08:40.902784Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-05-20T08:07:48.869128Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 99] 2022-05-20T08:07:48.873557Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-05-20T08:07:48.873825Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-05-20T08:07:48.874381Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-05-20T08:07:48.874785Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-05-20T08:07:48.879830Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-05-20T08:07:57.897657Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-05-21T02:09:14.314033Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 99] 2022-05-21T02:09:14.315569Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-05-21T02:09:14.315827Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-05-21T02:09:14.316484Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-05-21T02:09:14.320875Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-05-21T02:09:14.321764Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-05-21T02:09:23.340948Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-05-21T08:10:19.215076Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 100] 2022-05-21T08:10:19.216631Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-05-21T08:10:19.216888Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-05-21T08:10:19.217436Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-05-21T08:10:19.217860Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-05-21T08:10:19.218734Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-05-21T08:10:28.240749Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-05-22T08:07:13.777182Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 101] 2022-05-22T08:07:13.782790Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-05-22T08:07:13.783117Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-05-22T08:07:13.783634Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-05-22T08:07:13.784540Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-05-22T08:07:13.785627Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-05-22T08:07:22.803244Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-05-23T08:09:10.528264Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 102] 2022-05-23T08:09:10.533593Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-05-23T08:09:10.533861Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-05-23T08:09:10.534411Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-05-23T08:09:10.534986Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-05-23T08:09:10.536551Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-05-23T08:09:19.556698Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-05-24T08:01:44.393086Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 103] 2022-05-24T08:01:44.394403Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-05-24T08:01:44.394725Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-05-24T08:01:44.395287Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-05-24T08:01:44.399702Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-05-24T08:01:44.400532Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-05-24T08:01:53.418076Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-05-25T08:04:52.952512Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 104] 2022-05-25T08:04:52.953947Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-05-25T08:04:52.954264Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-05-25T08:04:52.954793Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-05-25T08:04:52.959353Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-05-25T08:04:52.960344Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-05-25T08:05:01.977721Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-05-26T08:10:12.794017Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 105] 2022-05-26T08:10:12.795492Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-05-26T08:10:12.796148Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-05-26T08:10:12.796730Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-05-26T08:10:12.797219Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-05-26T08:10:12.798296Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-05-26T08:10:21.816779Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-05-27T08:02:38.874386Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 106] 2022-05-27T08:02:38.882633Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-05-27T08:02:38.882929Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-05-27T08:02:38.883469Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-05-27T08:02:38.884011Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-05-27T08:02:38.884843Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-05-27T08:02:47.905952Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-05-28T08:02:27.164586Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 107] 2022-05-28T08:02:27.169625Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-05-28T08:02:27.169895Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-05-28T08:02:27.170472Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-05-28T08:02:27.170891Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-05-28T08:02:27.171863Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-05-28T08:02:36.189027Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-05-29T08:08:00.500705Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 108] 2022-05-29T08:08:00.502007Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-05-29T08:08:00.502270Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-05-29T08:08:00.506742Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-05-29T08:08:00.507197Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-05-29T08:08:00.508132Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-05-29T08:08:09.526995Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-05-30T08:04:13.638452Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 109] 2022-05-30T08:04:13.643815Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-05-30T08:04:13.644094Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-05-30T08:04:13.644718Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-05-30T08:04:13.645307Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-05-30T08:04:13.646249Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-05-30T08:04:22.665041Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-05-31T08:08:13.182996Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 110] 2022-05-31T08:08:13.184349Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-05-31T08:08:13.184646Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-05-31T08:08:13.185170Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-05-31T08:08:13.185629Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-05-31T08:08:13.186638Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-05-31T08:08:22.205075Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-06-01T08:09:54.560325Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 111] 2022-06-01T08:09:54.561724Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-06-01T08:09:54.561982Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-06-01T08:09:54.562473Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-06-01T08:09:54.562938Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-06-01T08:09:54.565398Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-06-01T08:10:03.587366Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-06-02T08:09:47.285192Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 112] 2022-06-02T08:09:47.286512Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-06-02T08:09:47.286779Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-06-02T08:09:47.287319Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-06-02T08:09:47.287747Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-06-02T08:09:47.288501Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-06-02T08:09:56.326356Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-06-03T08:08:28.820277Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 113] 2022-06-03T08:08:28.821730Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-06-03T08:08:28.822003Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-06-03T08:08:28.826490Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-06-03T08:08:28.826965Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-06-03T08:08:28.827930Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-06-03T08:08:37.845894Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-06-04T08:09:25.664069Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 114] 2022-06-04T08:09:25.665434Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-06-04T08:09:25.669584Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-06-04T08:09:25.670141Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-06-04T08:09:25.670570Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-06-04T08:09:25.671356Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-06-04T08:09:35.694848Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-06-05T08:06:46.932985Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 115] 2022-06-05T08:06:46.934466Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-06-05T08:06:46.934754Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-06-05T08:06:46.935262Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-06-05T08:06:46.936054Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-06-05T08:06:46.937041Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-06-05T08:06:55.960676Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-06-06T08:07:29.736195Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 116] 2022-06-06T08:07:29.738791Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-06-06T08:07:29.739144Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-06-06T08:07:29.739648Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-06-06T08:07:29.740117Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-06-06T08:07:29.740984Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-06-06T08:07:38.762960Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-06-07T08:05:30.958089Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 117] 2022-06-07T08:05:30.963377Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-06-07T08:05:30.963650Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-06-07T08:05:30.964172Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-06-07T08:05:30.964656Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-06-07T08:05:30.965438Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-06-07T08:05:39.986617Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-06-08T08:05:41.776178Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 118] 2022-06-08T08:05:41.781990Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-06-08T08:05:41.782264Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-06-08T08:05:41.782789Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-06-08T08:05:41.783619Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-06-08T08:05:41.784623Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-06-08T08:05:50.816449Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-06-09T08:01:16.484420Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 119] 2022-06-09T08:01:16.485832Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-06-09T08:01:16.486095Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-06-09T08:01:16.486628Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-06-09T08:01:16.487050Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-06-09T08:01:16.492176Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-06-09T08:01:25.511014Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-06-09T12:01:35.394400Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 119] 2022-06-09T12:01:35.407400Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-06-09T12:01:35.407642Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-06-09T12:01:35.414921Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-06-09T12:01:35.418080Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-06-09T12:01:35.419019Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-06-09T12:01:44.445312Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-06-10T08:04:25.650612Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 120] 2022-06-10T08:04:25.652252Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-06-10T08:04:25.652502Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-06-10T08:04:25.652978Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-06-10T08:04:25.653418Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-06-10T08:04:25.654319Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-06-10T08:04:34.676019Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-06-11T08:04:22.694132Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 121] 2022-06-11T08:04:22.696217Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-06-11T08:04:22.696474Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-06-11T08:04:22.697026Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-06-11T08:04:22.697420Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-06-11T08:04:22.698855Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-06-11T08:04:31.719019Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-06-12T08:06:22.625677Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 122] 2022-06-12T08:06:22.627045Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-06-12T08:06:22.627305Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-06-12T08:06:22.627816Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-06-12T08:06:22.628223Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-06-12T08:06:22.632928Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-06-12T08:06:31.658627Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-06-13T08:03:34.999097Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 123] 2022-06-13T08:03:35.000331Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-06-13T08:03:35.000573Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-06-13T08:03:35.001129Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-06-13T08:03:35.001888Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-06-13T08:03:35.008812Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-06-13T08:03:44.026236Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-06-13T19:18:37.509862Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 123] 2022-06-13T19:18:37.522040Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-06-13T19:18:37.522260Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-06-13T19:18:37.532243Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-06-13T19:18:37.535327Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-06-13T19:18:37.536070Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-06-13T19:18:46.560123Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-06-14T08:08:45.345668Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 124] 2022-06-14T08:08:45.347127Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-06-14T08:08:45.347367Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-06-14T08:08:45.347899Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-06-14T08:08:45.348664Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-06-14T08:08:45.353326Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-06-14T08:08:54.372216Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-06-14T13:18:09.394870Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 124] 2022-06-14T13:18:09.398973Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-06-14T13:18:09.399227Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-06-14T13:18:09.404568Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-06-14T13:18:09.406237Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-06-14T13:18:09.407227Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-06-14T13:18:18.428512Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-06-15T08:03:55.129517Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 125] 2022-06-15T08:03:55.130816Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-06-15T08:03:55.131046Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-06-15T08:03:55.135386Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-06-15T08:03:55.135938Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-06-15T08:03:55.137072Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-06-15T08:04:04.154675Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-06-16T08:09:09.058423Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 126] 2022-06-16T08:09:09.060717Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-06-16T08:09:09.060965Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-06-16T08:09:09.061477Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-06-16T08:09:09.061899Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-06-16T08:09:09.063466Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-06-16T08:09:18.080078Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-06-17T08:05:33.659762Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 127] 2022-06-17T08:05:33.661060Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-06-17T08:05:33.661311Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-06-17T08:05:33.661862Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-06-17T08:05:33.662525Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-06-17T08:05:33.663535Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-06-17T08:05:42.703379Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-06-18T08:07:00.447844Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 128] 2022-06-18T08:07:00.449069Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-06-18T08:07:00.449308Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-06-18T08:07:00.449852Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-06-18T08:07:00.450350Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-06-18T08:07:00.451160Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-06-18T08:07:09.467451Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-06-18T15:47:34.222252Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 1] 2022-06-18T15:47:34.242160Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-06-18T15:47:34.242265Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-06-18T15:47:34.242479Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-06-18T15:47:34.251298Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-06-18T15:47:34.251826Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-06-18T15:47:43.282081Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-06-19T08:07:01.887691Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 2] 2022-06-19T08:07:01.894934Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-06-19T08:07:01.895075Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-06-19T08:07:01.895301Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-06-19T08:07:01.895499Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-06-19T08:07:01.895855Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-06-19T08:07:10.911037Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-06-20T08:02:10.630696Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 3] 2022-06-20T08:02:10.638403Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-06-20T08:02:10.638527Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-06-20T08:02:10.638753Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-06-20T08:02:10.638956Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-06-20T08:02:10.639367Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-06-20T08:02:19.658721Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-06-21T08:02:17.385374Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 4] 2022-06-21T08:02:17.385985Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-06-21T08:02:17.386108Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-06-21T08:02:17.386330Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-06-21T08:02:17.386505Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-06-21T08:02:17.386897Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-06-21T08:02:26.411893Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-06-22T08:08:26.179612Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 5] 2022-06-22T08:08:26.180234Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-06-22T08:08:26.180345Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-06-22T08:08:26.180592Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-06-22T08:08:26.180771Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-06-22T08:08:26.181204Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-06-22T08:08:35.206140Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-06-23T08:02:14.054827Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 6] 2022-06-23T08:02:14.055497Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-06-23T08:02:14.055615Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-06-23T08:02:14.055851Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-06-23T08:02:14.056040Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-06-23T08:02:14.056433Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-06-23T08:02:23.078307Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-06-24T08:10:16.150565Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 7] 2022-06-24T08:10:16.151246Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-06-24T08:10:16.151360Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-06-24T08:10:16.151577Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-06-24T08:10:16.151755Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-06-24T08:10:16.152076Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-06-24T08:10:25.175436Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-06-25T08:09:55.661522Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 8] 2022-06-25T08:09:55.662169Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-06-25T08:09:55.662284Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-06-25T08:09:55.662515Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-06-25T08:09:55.662706Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-06-25T08:09:55.663297Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-06-25T08:10:04.682585Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-06-26T08:08:18.857710Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 9] 2022-06-26T08:08:18.858352Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-06-26T08:08:18.858465Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-06-26T08:08:18.858749Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-06-26T08:08:18.858963Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-06-26T08:08:18.859357Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-06-26T08:08:27.881119Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-06-27T08:08:59.529289Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 10] 2022-06-27T08:08:59.529901Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-06-27T08:08:59.530010Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-06-27T08:08:59.530234Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-06-27T08:08:59.530410Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-06-27T08:08:59.530777Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-06-27T08:09:08.551594Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-06-28T08:08:33.739223Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 11] 2022-06-28T08:08:33.739838Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-06-28T08:08:33.739942Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-06-28T08:08:33.740158Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-06-28T08:08:33.740352Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-06-28T08:08:33.740748Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-06-28T08:08:42.758478Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-06-29T08:01:18.188341Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 12] 2022-06-29T08:01:18.188992Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-06-29T08:01:18.189108Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-06-29T08:01:18.189331Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-06-29T08:01:18.189534Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-06-29T08:01:18.189925Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-06-29T08:01:27.226091Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-06-30T08:04:43.041191Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 13] 2022-06-30T08:04:43.041785Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-06-30T08:04:43.041918Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-06-30T08:04:43.042138Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-06-30T08:04:43.042318Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-06-30T08:04:43.049189Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-06-30T08:04:52.064835Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-07-01T02:08:19.103389Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 13] 2022-07-01T02:08:19.103961Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-07-01T02:08:19.104053Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-07-01T02:08:19.104297Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-07-01T02:08:19.104608Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-07-01T02:08:19.111981Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-07-01T02:08:28.130799Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-07-01T08:08:54.719910Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 14] 2022-07-01T08:08:54.720502Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-07-01T08:08:54.720672Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-07-01T08:08:54.727594Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-07-01T08:08:54.727967Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-07-01T08:08:54.728404Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-07-01T08:09:03.749876Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-07-02T08:06:20.513276Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 15] 2022-07-02T08:06:20.513906Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-07-02T08:06:20.514034Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-07-02T08:06:20.514256Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-07-02T08:06:20.514446Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-07-02T08:06:20.521774Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-07-02T08:06:29.541760Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-07-03T08:01:23.364310Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 16] 2022-07-03T08:01:23.371635Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-07-03T08:01:23.371789Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-07-03T08:01:23.372014Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-07-03T08:01:23.372194Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-07-03T08:01:23.372609Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-07-03T08:01:32.398800Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-07-04T08:09:13.017529Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 17] 2022-07-04T08:09:13.018147Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-07-04T08:09:13.018272Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-07-04T08:09:13.018494Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-07-04T08:09:13.018697Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-07-04T08:09:13.019112Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-07-04T08:09:22.041176Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-07-05T08:03:54.353008Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 18] 2022-07-05T08:03:54.360444Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-07-05T08:03:54.360587Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-07-05T08:03:54.360812Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-07-05T08:03:54.360997Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-07-05T08:03:54.361392Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-07-05T08:04:03.382216Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-07-06T08:03:56.081500Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 19] 2022-07-06T08:03:56.082206Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-07-06T08:03:56.082328Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-07-06T08:03:56.082578Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-07-06T08:03:56.082811Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-07-06T08:03:56.083226Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-07-06T08:04:05.104104Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-07-07T08:03:01.523658Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 20] 2022-07-07T08:03:01.524289Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-07-07T08:03:01.524402Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-07-07T08:03:01.524619Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-07-07T08:03:01.524799Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-07-07T08:03:01.525145Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-07-07T08:03:10.547288Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-07-08T08:08:05.675725Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 21] 2022-07-08T08:08:05.676714Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-07-08T08:08:05.676845Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-07-08T08:08:05.677141Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-07-08T08:08:05.677425Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-07-08T08:08:05.683132Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-07-08T08:08:14.704962Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-07-09T08:06:39.979459Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 22] 2022-07-09T08:06:39.986740Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-07-09T08:06:39.986866Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-07-09T08:06:39.987087Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-07-09T08:06:39.987274Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-07-09T08:06:39.987686Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-07-09T08:06:49.007500Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-07-10T08:09:40.138065Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 23] 2022-07-10T08:09:40.145345Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-07-10T08:09:40.145471Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-07-10T08:09:40.145698Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-07-10T08:09:40.145911Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-07-10T08:09:40.146249Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-07-10T08:09:49.165532Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-07-11T08:01:07.042643Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 24] 2022-07-11T08:01:07.043282Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-07-11T08:01:07.043398Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-07-11T08:01:07.043625Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-07-11T08:01:07.050539Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-07-11T08:01:07.051051Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-07-11T08:01:16.066432Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-07-12T08:10:27.184394Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 25] 2022-07-12T08:10:27.185295Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-07-12T08:10:27.185422Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-07-12T08:10:27.185660Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-07-12T08:10:27.185855Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-07-12T08:10:27.186268Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-07-12T08:10:36.211994Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-07-13T08:08:57.263219Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 26] 2022-07-13T08:08:57.263836Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-07-13T08:08:57.263946Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-07-13T08:08:57.264170Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-07-13T08:08:57.264389Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-07-13T08:08:57.271525Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-07-13T08:09:06.287654Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-07-14T08:03:20.954709Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 27] 2022-07-14T08:03:20.955356Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-07-14T08:03:20.955482Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-07-14T08:03:20.955702Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-07-14T08:03:20.955885Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-07-14T08:03:20.956541Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-07-14T08:03:29.982786Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-07-15T08:04:23.796813Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 28] 2022-07-15T08:04:23.797450Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-07-15T08:04:23.797561Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-07-15T08:04:23.797778Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-07-15T08:04:23.797959Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-07-15T08:04:23.798293Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-07-15T08:04:32.819157Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-07-16T08:08:11.074536Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 29] 2022-07-16T08:08:11.075203Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-07-16T08:08:11.075323Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-07-16T08:08:11.075548Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-07-16T08:08:11.075740Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-07-16T08:08:11.076141Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-07-16T08:08:20.103492Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-07-17T08:08:07.265446Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 30] 2022-07-17T08:08:07.266085Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-07-17T08:08:07.272846Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-07-17T08:08:07.273152Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-07-17T08:08:07.273374Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-07-17T08:08:07.273778Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-07-17T08:08:16.298274Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-07-18T08:04:20.227782Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 31] 2022-07-18T08:04:20.228391Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-07-18T08:04:20.228505Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-07-18T08:04:20.228769Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-07-18T08:04:20.228966Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-07-18T08:04:20.229350Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-07-18T08:04:29.251463Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-07-18T13:48:27.613468Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 31] 2022-07-18T13:48:27.632797Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-07-18T13:48:27.632899Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-07-18T13:48:27.633115Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-07-18T13:48:27.642264Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-07-18T13:48:27.642714Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-07-18T13:48:36.705005Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-07-19T08:04:09.491317Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 32] 2022-07-19T08:04:09.498924Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-07-19T08:04:09.499045Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-07-19T08:04:09.499265Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-07-19T08:04:09.499441Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-07-19T08:04:09.499786Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-07-19T08:04:18.519770Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-07-20T08:08:50.078292Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 33] 2022-07-20T08:08:50.078932Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-07-20T08:08:50.079051Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-07-20T08:08:50.085811Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-07-20T08:08:50.086038Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-07-20T08:08:50.086421Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-07-20T08:08:59.101880Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-07-21T08:03:58.511269Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 34] 2022-07-21T08:03:58.511878Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-07-21T08:03:58.512003Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-07-21T08:03:58.512220Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-07-21T08:03:58.512392Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-07-21T08:03:58.512840Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-07-21T08:04:07.535269Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-07-21T21:49:16.822337Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 34] 2022-07-21T21:49:16.822999Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-07-21T21:49:16.823109Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-07-21T21:49:16.823334Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-07-21T21:49:16.823643Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-07-21T21:49:16.824050Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-07-21T21:49:25.847643Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-07-22T08:04:58.703247Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 35] 2022-07-22T08:04:58.703856Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-07-22T08:04:58.703970Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-07-22T08:04:58.704190Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-07-22T08:04:58.704364Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-07-22T08:04:58.704810Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-07-22T08:05:07.719500Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-07-23T08:08:11.799901Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 36] 2022-07-23T08:08:11.807164Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-07-23T08:08:11.807290Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-07-23T08:08:11.807508Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-07-23T08:08:11.807724Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-07-23T08:08:11.808180Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-07-23T08:08:20.827131Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-07-24T08:02:23.356711Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 37] 2022-07-24T08:02:23.357314Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-07-24T08:02:23.357429Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-07-24T08:02:23.357670Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-07-24T08:02:23.365557Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-07-24T08:02:23.366604Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-07-24T08:02:32.387881Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-07-25T08:02:16.038427Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 38] 2022-07-25T08:02:16.039081Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-07-25T08:02:16.039195Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-07-25T08:02:16.039420Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-07-25T08:02:16.039596Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-07-25T08:02:16.039971Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-07-25T08:02:25.057924Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-07-26T08:03:46.737727Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 39] 2022-07-26T08:03:46.738351Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-07-26T08:03:46.738468Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-07-26T08:03:46.745335Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-07-26T08:03:46.745573Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-07-26T08:03:46.746057Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-07-26T08:03:55.761572Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-07-27T08:06:22.999136Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 40] 2022-07-27T08:06:22.999838Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-07-27T08:06:22.999964Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-07-27T08:06:23.000188Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-07-27T08:06:23.000372Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-07-27T08:06:23.000776Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-07-27T08:06:32.019937Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-07-28T08:01:24.560455Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 41] 2022-07-28T08:01:24.561064Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-07-28T08:01:24.561167Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-07-28T08:01:24.561400Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-07-28T08:01:24.561586Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-07-28T08:01:24.561901Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-07-28T08:01:33.584575Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-07-29T08:04:25.938408Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 42] 2022-07-29T08:04:25.939057Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-07-29T08:04:25.939171Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-07-29T08:04:25.939394Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-07-29T08:04:25.939596Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-07-29T08:04:25.939987Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-07-29T08:04:34.967360Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-07-30T08:05:36.498205Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 43] 2022-07-30T08:05:36.498835Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-07-30T08:05:36.498951Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-07-30T08:05:36.499167Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-07-30T08:05:36.499346Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-07-30T08:05:36.506485Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-07-30T08:05:45.520924Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-07-31T08:05:27.643869Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 44] 2022-07-31T08:05:27.644482Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-07-31T08:05:27.644591Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-07-31T08:05:27.644836Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-07-31T08:05:27.645014Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-07-31T08:05:27.645402Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-07-31T08:05:36.667451Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-08-01T08:09:48.161131Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 45] 2022-08-01T08:09:48.161783Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-08-01T08:09:48.161907Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-08-01T08:09:48.162139Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-08-01T08:09:48.162323Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-08-01T08:09:48.162724Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-08-01T08:09:57.184174Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-08-02T08:08:30.290697Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 46] 2022-08-02T08:08:30.291333Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-08-02T08:08:30.291454Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-08-02T08:08:30.298313Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-08-02T08:08:30.298567Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-08-02T08:08:30.298993Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-08-02T08:08:39.314141Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-08-03T08:08:46.695681Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 47] 2022-08-03T08:08:46.696293Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-08-03T08:08:46.696603Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-08-03T08:08:46.696908Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-08-03T08:08:46.697115Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-08-03T08:08:46.697553Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-08-03T08:08:55.718156Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-08-04T08:01:11.391868Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 48] 2022-08-04T08:01:11.392510Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-08-04T08:01:11.392625Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-08-04T08:01:11.392847Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-08-04T08:01:11.393030Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-08-04T08:01:11.400232Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-08-04T08:01:20.419136Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-08-05T08:05:54.171128Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 49] 2022-08-05T08:05:54.171781Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-08-05T08:05:54.171901Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-08-05T08:05:54.172118Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-08-05T08:05:54.172318Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-08-05T08:05:54.172735Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-08-05T08:06:03.195080Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-08-06T08:02:06.910294Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 50] 2022-08-06T08:02:06.910934Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-08-06T08:02:06.911047Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-08-06T08:02:06.911268Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-08-06T08:02:06.911450Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-08-06T08:02:06.911860Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-08-06T08:02:15.939365Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-08-07T08:05:10.844229Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 51] 2022-08-07T08:05:10.851645Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-08-07T08:05:10.851795Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-08-07T08:05:10.852052Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-08-07T08:05:10.852246Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-08-07T08:05:10.852646Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-08-07T08:05:19.877353Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-08-08T08:09:31.865175Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 52] 2022-08-08T08:09:31.868537Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-08-08T08:09:31.868668Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-08-08T08:09:31.868899Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-08-08T08:09:31.869079Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-08-08T08:09:31.869462Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-08-08T08:09:40.889672Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-08-09T08:07:19.190260Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 53] 2022-08-09T08:07:19.190900Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-08-09T08:07:19.191021Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-08-09T08:07:19.191238Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-08-09T08:07:19.191416Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-08-09T08:07:19.198825Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-08-09T08:07:28.214549Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-08-10T08:05:07.282884Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 54] 2022-08-10T08:05:07.283510Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-08-10T08:05:07.283640Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-08-10T08:05:07.283866Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-08-10T08:05:07.284046Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-08-10T08:05:07.284447Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-08-10T08:05:16.307059Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-08-11T08:05:06.357415Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 55] 2022-08-11T08:05:06.358067Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-08-11T08:05:06.358186Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-08-11T08:05:06.358436Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-08-11T08:05:06.358631Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-08-11T08:05:06.359003Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-08-11T08:05:15.379805Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-08-12T08:08:19.604412Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 56] 2022-08-12T08:08:19.605055Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-08-12T08:08:19.605169Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-08-12T08:08:19.605427Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-08-12T08:08:19.605623Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-08-12T08:08:19.606074Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-08-12T08:08:28.628360Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-08-13T08:10:06.748059Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 57] 2022-08-13T08:10:06.748790Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-08-13T08:10:06.748911Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-08-13T08:10:06.749140Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-08-13T08:10:06.749326Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-08-13T08:10:06.756360Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-08-13T08:10:15.770900Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-08-14T08:05:26.757723Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 58] 2022-08-14T08:05:26.758366Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-08-14T08:05:26.758481Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-08-14T08:05:26.758701Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-08-14T08:05:26.758912Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-08-14T08:05:26.765934Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-08-14T08:05:35.787693Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-08-15T08:02:13.833602Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 59] 2022-08-15T08:02:13.841013Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-08-15T08:02:13.841148Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-08-15T08:02:13.841373Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-08-15T08:02:13.841552Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-08-15T08:02:13.841931Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-08-15T08:02:22.861737Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-08-16T08:01:07.382891Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 60] 2022-08-16T08:01:07.383566Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-08-16T08:01:07.383680Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-08-16T08:01:07.383901Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-08-16T08:01:07.384088Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-08-16T08:01:07.384518Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-08-16T08:01:16.406287Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-08-17T08:04:31.233049Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 61] 2022-08-17T08:04:31.233668Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-08-17T08:04:31.233799Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-08-17T08:04:31.234032Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-08-17T08:04:31.234211Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-08-17T08:04:31.234594Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-08-17T08:04:40.256678Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-08-18T08:05:13.596183Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 62] 2022-08-18T08:05:13.596836Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-08-18T08:05:13.596957Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-08-18T08:05:13.597218Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-08-18T08:05:13.597423Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-08-18T08:05:13.604616Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-08-18T08:05:22.620222Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-08-19T08:04:14.087608Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 63] 2022-08-19T08:04:14.088246Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-08-19T08:04:14.088384Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-08-19T08:04:14.088604Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-08-19T08:04:14.088785Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-08-19T08:04:14.089169Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-08-19T08:04:23.111714Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-08-20T08:06:33.359037Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 64] 2022-08-20T08:06:33.360150Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-08-20T08:06:33.360304Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-08-20T08:06:33.360540Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-08-20T08:06:33.360744Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-08-20T08:06:33.361167Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-08-20T08:06:42.382557Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-08-21T08:05:04.901141Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 65] 2022-08-21T08:05:04.901742Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-08-21T08:05:04.901855Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-08-21T08:05:04.902096Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-08-21T08:05:04.902272Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-08-21T08:05:04.909271Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-08-21T08:05:13.934175Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-08-22T08:07:09.097173Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 66] 2022-08-22T08:07:09.104478Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-08-22T08:07:09.104593Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-08-22T08:07:09.104826Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-08-22T08:07:09.105032Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-08-22T08:07:09.105472Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-08-22T08:07:18.125306Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-08-23T08:08:05.235793Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 67] 2022-08-23T08:08:05.236401Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-08-23T08:08:05.236515Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-08-23T08:08:05.236725Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-08-23T08:08:05.236901Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-08-23T08:08:05.237282Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-08-23T08:08:14.260530Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-08-24T08:10:09.277009Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 68] 2022-08-24T08:10:09.277669Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-08-24T08:10:09.277789Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-08-24T08:10:09.278024Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-08-24T08:10:09.278205Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-08-24T08:10:09.285263Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-08-24T08:10:18.301851Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-08-25T08:04:18.794447Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 69] 2022-08-25T08:04:18.795111Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-08-25T08:04:18.795223Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-08-25T08:04:18.795437Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-08-25T08:04:18.795617Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-08-25T08:04:18.796028Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-08-25T08:04:27.815910Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-08-26T08:08:56.623343Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 70] 2022-08-26T08:08:56.623993Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-08-26T08:08:56.630742Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-08-26T08:08:56.631051Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-08-26T08:08:56.631270Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-08-26T08:08:56.631632Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-08-26T08:09:05.654689Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-08-27T08:05:17.772451Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 71] 2022-08-27T08:05:17.773098Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-08-27T08:05:17.773213Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-08-27T08:05:17.773432Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-08-27T08:05:17.773690Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-08-27T08:05:17.774092Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-08-27T08:05:26.795534Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-08-28T08:09:49.235324Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 72] 2022-08-28T08:09:49.235950Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-08-28T08:09:49.236075Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-08-28T08:09:49.236308Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-08-28T08:09:49.236494Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-08-28T08:09:49.243624Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-08-28T08:09:58.259246Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-08-29T08:08:15.858586Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 73] 2022-08-29T08:08:15.859171Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-08-29T08:08:15.859279Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-08-29T08:08:15.866423Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-08-29T08:08:15.866717Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-08-29T08:08:15.867103Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-08-29T08:08:24.890640Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-08-30T08:08:58.197369Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 74] 2022-08-30T08:08:58.197999Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-08-30T08:08:58.198117Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-08-30T08:08:58.198336Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-08-30T08:08:58.198522Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-08-30T08:08:58.205663Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-08-30T08:09:07.221243Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-08-31T08:01:37.789345Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 75] 2022-08-31T08:01:37.789942Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-08-31T08:01:37.790057Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-08-31T08:01:37.790294Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-08-31T08:01:37.790471Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-08-31T08:01:37.790856Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-08-31T08:01:46.813317Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-09-01T08:06:07.702188Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 76] 2022-09-01T08:06:07.702824Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-09-01T08:06:07.702957Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-09-01T08:06:07.703180Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-09-01T08:06:07.703354Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-09-01T08:06:07.710475Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-09-01T08:06:16.726520Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-09-02T08:10:45.310509Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 77] 2022-09-02T08:10:45.311104Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-09-02T08:10:45.311213Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-09-02T08:10:45.318087Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-09-02T08:10:45.318311Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-09-02T08:10:45.318612Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-09-02T08:10:54.334013Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-09-03T08:05:35.137478Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 78] 2022-09-03T08:05:35.138077Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-09-03T08:05:35.138178Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-09-03T08:05:35.145035Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-09-03T08:05:35.145276Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-09-03T08:05:35.145675Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-09-03T08:05:44.161226Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-09-04T08:08:15.590785Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 79] 2022-09-04T08:08:15.591380Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-09-04T08:08:15.591490Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-09-04T08:08:15.591703Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-09-04T08:08:15.598514Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-09-04T08:08:15.599009Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-09-04T08:08:24.615001Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-09-05T08:03:53.883878Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 80] 2022-09-05T08:03:53.884593Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-09-05T08:03:53.884703Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-09-05T08:03:53.884930Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-09-05T08:03:53.885114Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-09-05T08:03:53.885555Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-09-05T08:04:02.905392Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-09-06T08:05:41.339517Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 81] 2022-09-06T08:05:41.340119Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-09-06T08:05:41.340223Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-09-06T08:05:41.340485Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-09-06T08:05:41.340689Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-09-06T08:05:41.347819Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-09-06T08:05:50.363676Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-09-07T08:10:17.953466Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 82] 2022-09-07T08:10:17.954098Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-09-07T08:10:17.954199Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-09-07T08:10:17.954452Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-09-07T08:10:17.954710Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-09-07T08:10:17.955153Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-09-07T08:10:26.977300Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-09-08T08:07:33.815659Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 83] 2022-09-08T08:07:33.822973Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-09-08T08:07:33.823087Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-09-08T08:07:33.823320Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-09-08T08:07:33.823511Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-09-08T08:07:33.823964Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-09-08T08:07:42.844792Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-09-09T08:02:20.251950Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 84] 2022-09-09T08:02:20.252548Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-09-09T08:02:20.252641Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-09-09T08:02:20.252906Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-09-09T08:02:20.253102Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-09-09T08:02:20.253542Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-09-09T08:02:29.275830Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-09-10T08:08:39.384762Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 85] 2022-09-10T08:08:39.385397Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-09-10T08:08:39.385505Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-09-10T08:08:39.385743Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-09-10T08:08:39.385930Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-09-10T08:08:39.386426Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-09-10T08:08:48.407812Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-09-11T08:08:17.857889Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 86] 2022-09-11T08:08:17.859901Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-09-11T08:08:17.860003Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-09-11T08:08:17.860212Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-09-11T08:08:17.860427Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-09-11T08:08:17.860858Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-09-11T08:08:26.881428Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-09-12T08:08:01.537523Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 87] 2022-09-12T08:08:01.538174Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-09-12T08:08:01.538288Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-09-12T08:08:01.545260Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-09-12T08:08:01.545530Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-09-12T08:08:01.546000Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-09-12T08:08:10.566197Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-09-13T08:07:15.136589Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 88] 2022-09-13T08:07:15.137206Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-09-13T08:07:15.137309Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-09-13T08:07:15.137569Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-09-13T08:07:15.137779Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-09-13T08:07:15.138229Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-09-13T08:07:24.160616Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-09-14T08:02:10.563431Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 89] 2022-09-14T08:02:10.564056Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-09-14T08:02:10.564156Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-09-14T08:02:10.564381Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-09-14T08:02:10.564586Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-09-14T08:02:10.566031Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-09-14T08:02:19.580450Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-09-15T08:09:39.315071Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 90] 2022-09-15T08:09:39.316233Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-09-15T08:09:39.316514Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-09-15T08:09:39.316774Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-09-15T08:09:39.316971Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-09-15T08:09:39.317398Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-09-15T08:09:48.340101Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-09-16T08:09:30.547188Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 91] 2022-09-16T08:09:30.554487Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-09-16T08:09:30.554604Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-09-16T08:09:30.554832Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-09-16T08:09:30.555017Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-09-16T08:09:30.555508Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-09-16T08:09:39.575441Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-09-17T08:09:36.259604Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 92] 2022-09-17T08:09:36.266824Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-09-17T08:09:36.266951Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-09-17T08:09:36.267186Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-09-17T08:09:36.267381Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-09-17T08:09:36.267835Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-09-17T08:09:45.287824Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-09-18T08:04:35.271238Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 93] 2022-09-18T08:04:35.271885Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-09-18T08:04:35.271998Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-09-18T08:04:35.272222Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-09-18T08:04:35.272435Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-09-18T08:04:35.272897Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-09-18T08:04:44.309160Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-09-19T08:06:33.426227Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation 94] 2022-09-19T08:06:33.426867Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-09-19T08:06:33.426974Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-09-19T08:06:33.427207Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-09-19T08:06:33.427422Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-09-19T08:06:33.427811Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-09-19T08:06:42.451229Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-09-19T21:52:05.840774Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_94] 2022-09-19T21:52:05.841453Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-09-19T21:52:05.841574Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-09-19T21:52:05.843338Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-09-19T21:52:05.844099Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-09-19T21:52:05.844616Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-09-19T21:52:14.869167Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-09-20T08:04:21.533923Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_95] 2022-09-20T08:04:21.534634Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-09-20T08:04:21.534787Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-09-20T08:04:21.541076Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-09-20T08:04:21.541318Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-09-20T08:04:21.542114Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-09-20T08:04:30.556854Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-09-21T08:08:25.769955Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_96] 2022-09-21T08:08:25.770518Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-09-21T08:08:25.770614Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-09-21T08:08:25.777472Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-09-21T08:08:25.777727Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-09-21T08:08:25.778195Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-09-21T08:08:34.799314Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-09-22T08:09:18.995671Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_97] 2022-09-22T08:09:18.996291Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-09-22T08:09:18.996407Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-09-22T08:09:18.996650Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-09-22T08:09:19.003529Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-09-22T08:09:19.003912Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-09-22T08:09:28.019519Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-09-23T08:08:24.944095Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_98] 2022-09-23T08:08:24.951360Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-09-23T08:08:24.951467Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-09-23T08:08:24.951697Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-09-23T08:08:24.951895Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-09-23T08:08:24.952360Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-09-23T08:08:33.974267Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-09-24T08:04:54.372589Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_99] 2022-09-24T08:04:54.373220Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-09-24T08:04:54.373333Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-09-24T08:04:54.380204Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-09-24T08:04:54.380468Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-09-24T08:04:54.380958Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-09-24T08:05:03.401669Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-09-25T08:03:28.644619Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_100] 2022-09-25T08:03:28.645260Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-09-25T08:03:28.645372Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-09-25T08:03:28.645642Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-09-25T08:03:28.645864Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-09-25T08:03:28.653098Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-09-25T08:03:37.669574Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-09-26T08:09:22.482790Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_101] 2022-09-26T08:09:22.483451Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-09-26T08:09:22.483575Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-09-26T08:09:22.483813Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-09-26T08:09:22.484091Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-09-26T08:09:22.484457Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-09-26T08:09:31.506967Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-09-27T08:09:12.370667Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_102] 2022-09-27T08:09:12.371292Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-09-27T08:09:12.371393Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-09-27T08:09:12.371621Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-09-27T08:09:12.371840Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-09-27T08:09:12.372194Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-09-27T08:09:21.394170Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-09-28T08:03:43.120902Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_103] 2022-09-28T08:03:43.121499Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-09-28T08:03:43.121596Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-09-28T08:03:43.121856Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-09-28T08:03:43.122054Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-09-28T08:03:43.122444Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-09-28T08:03:52.145142Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-09-29T08:06:23.846692Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_104] 2022-09-29T08:06:23.853929Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-09-29T08:06:23.854056Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-09-29T08:06:23.854316Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-09-29T08:06:23.854531Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-09-29T08:06:23.854955Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-09-29T08:06:32.875655Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-09-30T08:04:48.735376Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_105] 2022-09-30T08:04:48.742601Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-09-30T08:04:48.742715Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-09-30T08:04:48.742965Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-09-30T08:04:48.743163Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-09-30T08:04:48.743633Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-09-30T08:04:57.762579Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-10-01T08:07:35.264054Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_106] 2022-10-01T08:07:35.264725Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-10-01T08:07:35.264830Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-10-01T08:07:35.265057Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-10-01T08:07:35.271920Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-10-01T08:07:35.272334Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-10-01T08:07:44.291163Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-10-02T08:04:20.704014Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_107] 2022-10-02T08:04:20.704735Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-10-02T08:04:20.704851Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-10-02T08:04:20.705103Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-10-02T08:04:20.705335Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-10-02T08:04:20.705769Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-10-02T08:04:29.728359Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-10-03T08:07:55.179888Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_108] 2022-10-03T08:07:55.180482Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-10-03T08:07:55.180587Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-10-03T08:07:55.180826Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-10-03T08:07:55.187777Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-10-03T08:07:55.188255Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-10-03T08:08:04.211824Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-10-04T08:10:27.993495Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_109] 2022-10-04T08:10:27.994092Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-10-04T08:10:27.994204Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-10-04T08:10:27.994437Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-10-04T08:10:27.994690Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-10-04T08:10:28.001755Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-10-04T08:10:37.017416Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-10-05T08:05:43.118833Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_110] 2022-10-05T08:05:43.119506Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-10-05T08:05:43.119615Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-10-05T08:05:43.119861Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-10-05T08:05:43.120094Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-10-05T08:05:43.120540Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-10-05T08:05:52.148364Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-10-06T08:00:44.774252Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_111] 2022-10-06T08:00:44.781613Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-10-06T08:00:44.781777Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-10-06T08:00:44.782029Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-10-06T08:00:44.782248Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-10-06T08:00:44.782678Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-10-06T08:00:53.808591Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-10-07T08:03:41.201747Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_112] 2022-10-07T08:03:41.202380Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-10-07T08:03:41.202549Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-10-07T08:03:41.202798Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-10-07T08:03:41.203002Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-10-07T08:03:41.203536Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-10-07T08:03:50.225789Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-10-08T08:04:54.776529Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_113] 2022-10-08T08:04:54.783903Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-10-08T08:04:54.784038Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-10-08T08:04:54.784285Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-10-08T08:04:54.784530Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-10-08T08:04:54.785009Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-10-08T08:05:03.810584Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-10-09T08:05:56.079916Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_114] 2022-10-09T08:05:56.080573Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-10-09T08:05:56.080686Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-10-09T08:05:56.080928Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-10-09T08:05:56.081132Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-10-09T08:05:56.081569Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-10-09T08:06:05.102914Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-10-10T07:50:47.528215Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_114] 2022-10-10T07:50:47.537406Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-10-10T07:50:47.547766Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-10-10T07:50:47.548006Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-10-10T07:50:47.555484Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-10-10T07:50:47.558607Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-10-10T07:50:56.605516Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-10-10T08:01:40.515026Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_115] 2022-10-10T08:01:40.515692Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-10-10T08:01:40.515815Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-10-10T08:01:40.516054Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-10-10T08:01:40.516266Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-10-10T08:01:40.532498Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-10-10T08:01:49.548978Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-10-11T08:06:11.254183Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_116] 2022-10-11T08:06:11.261536Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-10-11T08:06:11.261662Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-10-11T08:06:11.261884Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-10-11T08:06:11.262071Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-10-11T08:06:11.262487Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-10-11T08:06:20.283074Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-10-12T08:06:07.654642Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_117] 2022-10-12T08:06:07.655232Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-10-12T08:06:07.655348Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-10-12T08:06:07.655574Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-10-12T08:06:07.662388Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-10-12T08:06:07.662902Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-10-12T08:06:16.679047Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-10-13T08:08:29.658674Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_118] 2022-10-13T08:08:29.665976Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-10-13T08:08:29.666131Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-10-13T08:08:29.666364Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-10-13T08:08:29.666562Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-10-13T08:08:29.666959Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-10-13T08:08:38.695777Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-10-13T09:22:54.643902Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_118] 2022-10-13T09:22:54.764749Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-10-13T09:22:54.764887Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-10-13T09:22:54.795639Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-10-13T09:22:54.843141Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-10-13T09:22:54.843679Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-10-13T09:23:03.907346Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-10-14T02:07:34.433115Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_118] 2022-10-14T02:07:34.433702Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-10-14T02:07:34.433823Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-10-14T02:07:34.434050Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-10-14T02:07:34.445016Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-10-14T02:07:34.445439Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-10-14T02:07:43.469415Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-10-14T08:04:32.914627Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_119] 2022-10-14T08:04:32.915313Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-10-14T08:04:32.915440Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-10-14T08:04:32.915681Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-10-14T08:04:32.915937Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-10-14T08:04:32.916341Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-10-14T08:04:41.960144Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-10-15T08:05:40.184151Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_120] 2022-10-15T08:05:40.184788Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-10-15T08:05:40.184895Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-10-15T08:05:40.185102Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-10-15T08:05:40.185289Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-10-15T08:05:40.192313Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-10-15T08:05:49.207738Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-10-16T08:05:17.794598Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_121] 2022-10-16T08:05:17.795216Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-10-16T08:05:17.795333Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-10-16T08:05:17.795545Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-10-16T08:05:17.795739Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-10-16T08:05:17.796201Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-10-16T08:05:26.827487Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-10-17T08:09:59.319836Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_122] 2022-10-17T08:09:59.320430Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-10-17T08:09:59.320561Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-10-17T08:09:59.327442Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-10-17T08:09:59.327751Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-10-17T08:09:59.328170Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-10-17T08:10:08.348657Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-10-18T08:03:09.309388Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_123] 2022-10-18T08:03:09.310041Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-10-18T08:03:09.310161Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-10-18T08:03:09.310380Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-10-18T08:03:09.317225Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-10-18T08:03:09.317730Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-10-18T08:03:18.337531Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-10-19T08:03:54.631746Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_124] 2022-10-19T08:03:54.632353Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-10-19T08:03:54.639104Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-10-19T08:03:54.639355Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-10-19T08:03:54.639532Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-10-19T08:03:54.639900Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-10-19T08:04:03.687996Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-10-20T08:03:40.165660Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_125] 2022-10-20T08:03:40.166341Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-10-20T08:03:40.166462Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-10-20T08:03:40.166688Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-10-20T08:03:40.166883Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-10-20T08:03:40.174527Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-10-20T08:03:49.194651Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-10-21T08:07:02.277581Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_126] 2022-10-21T08:07:02.278283Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-10-21T08:07:02.278406Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-10-21T08:07:02.278637Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-10-21T08:07:02.278822Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-10-21T08:07:02.285919Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-10-21T08:07:11.302528Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-10-22T08:05:39.119336Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_127] 2022-10-22T08:05:39.119975Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-10-22T08:05:39.120114Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-10-22T08:05:39.120353Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-10-22T08:05:39.120555Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-10-22T08:05:39.120995Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-10-22T08:05:48.142185Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-10-23T08:04:54.907718Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_128] 2022-10-23T08:04:54.908313Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-10-23T08:04:54.908440Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-10-23T08:04:54.908673Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-10-23T08:04:54.908862Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-10-23T08:04:54.916149Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-10-23T08:05:03.931866Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-10-24T08:06:26.097197Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_129] 2022-10-24T08:06:26.097859Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-10-24T08:06:26.097978Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-10-24T08:06:26.098208Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-10-24T08:06:26.098389Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-10-24T08:06:26.098798Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-10-24T08:06:35.121537Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-10-25T08:06:04.668937Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_130] 2022-10-25T08:06:04.669537Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-10-25T08:06:04.694950Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-10-25T08:06:04.695261Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-10-25T08:06:04.695496Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-10-25T08:06:04.696060Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-10-25T08:06:13.716276Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-10-26T08:04:30.606906Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_131] 2022-10-26T08:04:30.607550Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-10-26T08:04:30.607695Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-10-26T08:04:30.607935Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-10-26T08:04:30.608121Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-10-26T08:04:30.608606Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-10-26T08:04:39.631651Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-10-27T08:07:33.055184Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_132] 2022-10-27T08:07:33.055848Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-10-27T08:07:33.055971Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-10-27T08:07:33.056229Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-10-27T08:07:33.056422Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-10-27T08:07:33.056858Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-10-27T08:07:42.102088Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-10-28T08:09:14.198474Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_133] 2022-10-28T08:09:14.199092Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-10-28T08:09:14.199211Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-10-28T08:09:14.199438Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-10-28T08:09:14.199631Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-10-28T08:09:14.225981Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-10-28T08:09:23.242109Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-10-29T08:03:17.933371Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_134] 2022-10-29T08:03:17.940621Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-10-29T08:03:17.940755Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-10-29T08:03:17.941007Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-10-29T08:03:17.941206Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-10-29T08:03:17.941632Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-10-29T08:03:26.962542Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-10-30T08:07:39.417452Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_135] 2022-10-30T08:07:39.418136Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-10-30T08:07:39.418324Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-10-30T08:07:39.425455Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-10-30T08:07:39.425900Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-10-30T08:07:39.426367Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-10-30T08:07:48.446224Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-10-31T08:07:23.824587Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_136] 2022-10-31T08:07:23.831872Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-10-31T08:07:23.832003Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-10-31T08:07:23.832233Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-10-31T08:07:23.832420Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-10-31T08:07:23.832856Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-10-31T08:07:32.853114Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-11-01T08:05:38.461551Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_137] 2022-11-01T08:05:38.468894Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-11-01T08:05:38.469030Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-11-01T08:05:38.469274Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-11-01T08:05:38.469469Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-11-01T08:05:38.469908Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-11-01T08:05:47.490081Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-11-02T08:05:00.463594Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_138] 2022-11-02T08:05:00.464223Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-11-02T08:05:00.464347Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-11-02T08:05:00.464572Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-11-02T08:05:00.471470Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-11-02T08:05:00.471983Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-11-02T08:05:09.491781Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-11-03T08:10:23.086147Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_139] 2022-11-03T08:10:23.086880Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-11-03T08:10:23.086997Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-11-03T08:10:23.087256Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-11-03T08:10:23.087467Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-11-03T08:10:23.087922Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-11-03T08:10:32.110881Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-11-04T08:07:31.361183Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_140] 2022-11-04T08:07:31.368216Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-11-04T08:07:31.368339Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-11-04T08:07:31.368563Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-11-04T08:07:31.368788Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-11-04T08:07:31.369248Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-11-04T08:07:40.390453Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-11-05T08:01:50.538913Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_141] 2022-11-05T08:01:50.539539Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-11-05T08:01:50.539690Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-11-05T08:01:50.539922Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-11-05T08:01:50.540113Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-11-05T08:01:50.540626Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-11-05T08:01:59.563249Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-11-06T08:05:39.636410Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_142] 2022-11-06T08:05:39.643817Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-11-06T08:05:39.643946Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-11-06T08:05:39.644204Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-11-06T08:05:39.644401Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-11-06T08:05:39.644888Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-11-06T08:05:48.665355Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-11-07T08:01:07.304427Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_143] 2022-11-07T08:01:07.305118Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-11-07T08:01:07.305244Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-11-07T08:01:07.305479Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-11-07T08:01:07.305674Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-11-07T08:01:07.313323Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-11-07T08:01:16.342238Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-11-08T08:01:09.010517Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_144] 2022-11-08T08:01:09.017816Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-11-08T08:01:09.018157Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-11-08T08:01:09.018399Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-11-08T08:01:09.018592Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-11-08T08:01:09.019079Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-11-08T08:01:18.039597Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-11-09T08:07:22.257425Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_145] 2022-11-09T08:07:22.258099Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-11-09T08:07:22.258236Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-11-09T08:07:22.258472Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-11-09T08:07:22.258672Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-11-09T08:07:22.259047Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-11-09T08:07:31.283066Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-11-10T08:01:56.210439Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_146] 2022-11-10T08:01:56.211101Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-11-10T08:01:56.211219Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-11-10T08:01:56.211448Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-11-10T08:01:56.211660Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-11-10T08:01:56.218775Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-11-10T08:02:05.235014Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-11-11T08:02:07.766868Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_147] 2022-11-11T08:02:07.767523Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-11-11T08:02:07.767643Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-11-11T08:02:07.767870Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-11-11T08:02:07.768063Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-11-11T08:02:07.768471Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-11-11T08:02:16.795438Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-11-12T08:10:31.245160Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_148] 2022-11-12T08:10:31.245871Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-11-12T08:10:31.245988Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-11-12T08:10:31.246235Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-11-12T08:10:31.246435Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-11-12T08:10:31.246882Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-11-12T08:10:40.275054Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-11-13T08:10:28.313554Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_149] 2022-11-13T08:10:28.314330Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-11-13T08:10:28.314443Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-11-13T08:10:28.314673Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-11-13T08:10:28.314866Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-11-13T08:10:28.315336Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-11-13T08:10:37.337666Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-11-14T08:01:12.334640Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_150] 2022-11-14T08:01:12.335412Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-11-14T08:01:12.335525Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-11-14T08:01:12.335759Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-11-14T08:01:12.335954Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-11-14T08:01:12.336393Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-11-14T08:01:21.359021Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-11-15T08:10:26.694921Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_151] 2022-11-15T08:10:26.695614Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-11-15T08:10:26.695768Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-11-15T08:10:26.696013Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-11-15T08:10:26.696205Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-11-15T08:10:26.696640Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-11-15T08:10:35.722820Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-11-16T08:09:09.007320Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_152] 2022-11-16T08:09:09.008013Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-11-16T08:09:09.008126Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-11-16T08:09:09.008356Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-11-16T08:09:09.008583Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-11-16T08:09:09.009077Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-11-16T08:09:18.032454Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-11-17T08:01:59.199040Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_153] 2022-11-17T08:01:59.199757Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-11-17T08:01:59.199876Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-11-17T08:01:59.200104Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-11-17T08:01:59.200296Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-11-17T08:01:59.200787Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-11-17T08:02:08.222705Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-11-18T08:06:20.929498Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_154] 2022-11-18T08:06:20.930212Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-11-18T08:06:20.930332Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-11-18T08:06:20.930563Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-11-18T08:06:20.930752Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-11-18T08:06:20.931184Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-11-18T08:06:29.954082Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-11-19T02:09:31.820362Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_154] 2022-11-19T02:09:31.820976Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-11-19T02:09:31.821092Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-11-19T02:09:31.821312Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-11-19T02:09:31.821649Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-11-19T02:09:31.822041Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-11-19T02:09:40.843087Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-11-19T08:01:52.414070Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_155] 2022-11-19T08:01:52.414710Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-11-19T08:01:52.414833Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-11-19T08:01:52.415062Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-11-19T08:01:52.415259Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-11-19T08:01:52.422420Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-11-19T08:02:01.462750Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-11-20T08:05:48.755989Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_156] 2022-11-20T08:05:48.756606Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-11-20T08:05:48.756728Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-11-20T08:05:48.785105Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-11-20T08:05:48.785467Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-11-20T08:05:48.786008Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-11-20T08:05:57.812535Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-11-21T08:03:33.958676Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_157] 2022-11-21T08:03:33.965972Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-11-21T08:03:33.966102Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-11-21T08:03:33.966336Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-11-21T08:03:33.966532Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-11-21T08:03:33.967037Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-11-21T08:03:42.990631Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-11-22T08:01:17.394053Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_158] 2022-11-22T08:01:17.394667Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-11-22T08:01:17.394789Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-11-22T08:01:17.395020Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-11-22T08:01:17.402009Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-11-22T08:01:17.402391Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-11-22T08:01:26.431501Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-11-23T08:02:21.590093Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_159] 2022-11-23T08:02:21.590879Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-11-23T08:02:21.591024Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-11-23T08:02:21.591288Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-11-23T08:02:21.591539Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-11-23T08:02:21.592105Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-11-23T08:02:30.620562Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-11-24T08:06:07.852277Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_160] 2022-11-24T08:06:07.852982Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-11-24T08:06:07.853106Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-11-24T08:06:07.853334Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-11-24T08:06:07.853528Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-11-24T08:06:07.853893Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-11-24T08:06:16.876488Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-11-25T08:05:34.445098Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_161] 2022-11-25T08:05:34.445734Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-11-25T08:05:34.452598Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-11-25T08:05:34.452874Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-11-25T08:05:34.453107Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-11-25T08:05:34.453441Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-11-25T08:05:43.496034Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-11-26T08:07:37.234623Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_162] 2022-11-26T08:07:37.235273Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-11-26T08:07:37.235400Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-11-26T08:07:37.235648Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-11-26T08:07:37.235859Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-11-26T08:07:37.236198Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-11-26T08:07:46.256459Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-11-27T08:10:14.839080Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_163] 2022-11-27T08:10:14.846470Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-11-27T08:10:14.846608Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-11-27T08:10:14.846850Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-11-27T08:10:14.847049Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-11-27T08:10:14.847519Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-11-27T08:10:23.911661Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-11-28T08:04:35.864196Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_164] 2022-11-28T08:04:35.864801Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-11-28T08:04:35.864921Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-11-28T08:04:35.865148Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-11-28T08:04:35.865325Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-11-28T08:04:35.872384Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-11-28T08:04:44.888310Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-11-29T08:03:36.146720Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_165] 2022-11-29T08:03:36.154114Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-11-29T08:03:36.154251Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-11-29T08:03:36.154487Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-11-29T08:03:36.154686Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-11-29T08:03:36.155219Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-11-29T08:03:45.202727Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-11-30T08:09:28.323459Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_166] 2022-11-30T08:09:28.324149Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-11-30T08:09:28.324263Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-11-30T08:09:28.324511Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-11-30T08:09:28.324712Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-11-30T08:09:28.325096Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-11-30T08:09:37.347848Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-12-01T08:06:14.868500Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_167] 2022-12-01T08:06:14.869131Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-12-01T08:06:14.869269Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-12-01T08:06:14.869509Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-12-01T08:06:14.869705Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-12-01T08:06:14.877006Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-12-01T08:06:23.892029Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-12-02T02:09:24.364940Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_167] 2022-12-02T02:09:24.365541Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-12-02T02:09:24.365655Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-12-02T02:09:24.365904Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-12-02T02:09:24.372908Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-12-02T02:09:24.373339Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-12-02T02:09:33.403220Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-12-02T08:03:43.400491Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_168] 2022-12-02T08:03:43.401122Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-12-02T08:03:43.401238Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-12-02T08:03:43.401472Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-12-02T08:03:43.401653Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-12-02T08:03:43.408784Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-12-02T08:03:52.424569Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-12-03T08:03:02.871201Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_169] 2022-12-03T08:03:02.871833Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-12-03T08:03:02.871947Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-12-03T08:03:02.872175Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-12-03T08:03:02.872382Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-12-03T08:03:02.872804Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-12-03T08:03:11.917823Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-12-04T08:04:58.701324Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_170] 2022-12-04T08:04:58.708626Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-12-04T08:04:58.708753Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-12-04T08:04:58.708979Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-12-04T08:04:58.709173Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-12-04T08:04:58.709578Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-12-04T08:05:07.732281Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-12-05T08:09:58.073741Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_171] 2022-12-05T08:09:58.081137Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-12-05T08:09:58.081271Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-12-05T08:09:58.081511Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-12-05T08:09:58.081732Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-12-05T08:09:58.082146Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-12-05T08:10:07.101994Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-12-06T08:02:38.274797Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_172] 2022-12-06T08:02:38.275408Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-12-06T08:02:38.275523Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-12-06T08:02:38.275768Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-12-06T08:02:38.282542Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-12-06T08:02:38.283056Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-12-06T08:02:47.301591Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-12-07T08:02:23.632518Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_173] 2022-12-07T08:02:23.633189Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-12-07T08:02:23.633309Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-12-07T08:02:23.633532Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-12-07T08:02:23.633731Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-12-07T08:02:23.634115Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-12-07T08:02:32.656363Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-12-08T08:05:50.629944Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_174] 2022-12-08T08:05:50.630652Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-12-08T08:05:50.630787Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-12-08T08:05:50.631024Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-12-08T08:05:50.631213Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-12-08T08:05:50.631600Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-12-08T08:05:59.651536Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-12-09T08:03:38.878209Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_175] 2022-12-09T08:03:38.878892Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-12-09T08:03:38.879009Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-12-09T08:03:38.879245Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-12-09T08:03:38.879436Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-12-09T08:03:38.879900Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-12-09T08:03:47.902171Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-12-10T08:06:43.759966Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_176] 2022-12-10T08:06:43.767289Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-12-10T08:06:43.767439Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-12-10T08:06:43.767671Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-12-10T08:06:43.767858Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-12-10T08:06:43.768314Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-12-10T08:06:52.796111Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-12-11T08:02:01.939293Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_177] 2022-12-11T08:02:01.946582Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-12-11T08:02:01.946709Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-12-11T08:02:01.946966Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-12-11T08:02:01.947162Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-12-11T08:02:01.947537Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-12-11T08:02:10.979979Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-12-12T08:02:12.847084Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_178] 2022-12-12T08:02:12.864580Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-12-12T08:02:12.864713Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-12-12T08:02:12.865015Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-12-12T08:02:12.865212Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-12-12T08:02:12.865620Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-12-12T08:02:21.885687Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-12-13T08:04:44.695121Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_179] 2022-12-13T08:04:44.695758Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-12-13T08:04:44.702534Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-12-13T08:04:44.702783Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-12-13T08:04:44.702979Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-12-13T08:04:44.703416Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-12-13T08:04:53.727755Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-12-14T08:03:20.088808Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_180] 2022-12-14T08:03:20.089495Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-12-14T08:03:20.089616Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-12-14T08:03:20.089848Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-12-14T08:03:20.090031Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-12-14T08:03:20.090455Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-12-14T08:03:29.111840Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-12-15T08:06:21.528802Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_181] 2022-12-15T08:06:21.529448Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-12-15T08:06:21.529562Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-12-15T08:06:21.529815Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-12-15T08:06:21.530021Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-12-15T08:06:21.530468Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-12-15T08:06:30.552982Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-12-16T08:07:03.871226Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_182] 2022-12-16T08:07:03.871835Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-12-16T08:07:03.878554Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-12-16T08:07:03.878844Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-12-16T08:07:03.879055Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-12-16T08:07:03.879461Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-12-16T08:07:12.899084Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-12-16T09:50:26.355681Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_182] 2022-12-16T09:50:26.374306Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-12-16T09:50:26.374418Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-12-16T09:50:26.374632Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-12-16T09:50:26.383750Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-12-16T09:50:26.384212Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-12-16T09:50:35.418408Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-12-17T08:09:18.435679Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_183] 2022-12-17T08:09:18.436417Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-12-17T08:09:18.436535Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-12-17T08:09:18.436784Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-12-17T08:09:18.436985Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-12-17T08:09:18.444035Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-12-17T08:09:27.459449Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-12-18T08:04:03.871632Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_184] 2022-12-18T08:04:03.878922Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-12-18T08:04:03.879036Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-12-18T08:04:03.879288Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-12-18T08:04:03.879493Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-12-18T08:04:03.879896Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-12-18T08:04:12.898934Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-12-19T08:02:18.914398Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_185] 2022-12-19T08:02:18.921712Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-12-19T08:02:18.921837Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-12-19T08:02:18.922059Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-12-19T08:02:18.922272Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-12-19T08:02:18.922694Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-12-19T08:02:27.942975Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-12-20T08:09:14.488876Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_186] 2022-12-20T08:09:14.489481Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-12-20T08:09:14.489596Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-12-20T08:09:14.496467Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-12-20T08:09:14.496740Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-12-20T08:09:14.497148Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-12-20T08:09:23.513106Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-12-21T02:07:52.468667Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_186] 2022-12-21T02:07:52.469307Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-12-21T02:07:52.469425Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-12-21T02:07:52.469653Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-12-21T02:07:52.470034Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-12-21T02:07:52.470437Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-12-21T02:08:01.519239Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-12-21T08:05:53.753502Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_187] 2022-12-21T08:05:53.760878Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-12-21T08:05:53.761011Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-12-21T08:05:53.761237Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-12-21T08:05:53.761424Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-12-21T08:05:53.761871Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-12-21T08:06:02.806129Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-12-22T08:09:58.995728Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_188] 2022-12-22T08:09:58.996388Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-12-22T08:09:59.014141Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-12-22T08:09:59.014459Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-12-22T08:09:59.014716Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-12-22T08:09:59.015133Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-12-22T08:10:08.046976Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-12-23T08:01:22.641374Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_189] 2022-12-23T08:01:22.645465Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-12-23T08:01:22.645595Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-12-23T08:01:22.645830Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-12-23T08:01:22.646050Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-12-23T08:01:22.646495Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-12-23T08:01:31.666770Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-12-24T08:08:19.303419Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_190] 2022-12-24T08:08:19.304041Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-12-24T08:08:19.304174Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-12-24T08:08:19.311064Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-12-24T08:08:19.311378Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-12-24T08:08:19.311898Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-12-24T08:08:28.361875Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-12-25T08:09:20.846275Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_191] 2022-12-25T08:09:20.846923Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-12-25T08:09:20.847046Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-12-25T08:09:20.847271Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-12-25T08:09:20.847463Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-12-25T08:09:20.848003Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-12-25T08:09:29.870724Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-12-26T08:04:26.457084Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_192] 2022-12-26T08:04:26.457699Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-12-26T08:04:26.457812Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-12-26T08:04:26.458058Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-12-26T08:04:26.464852Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-12-26T08:04:26.465377Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-12-26T08:04:35.481285Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-12-27T08:03:18.317828Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_193] 2022-12-27T08:03:18.318449Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-12-27T08:03:18.325176Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-12-27T08:03:18.325486Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-12-27T08:03:18.325708Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-12-27T08:03:18.326246Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-12-27T08:03:27.346465Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-12-28T08:07:12.500791Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_194] 2022-12-28T08:07:12.501433Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-12-28T08:07:12.501552Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-12-28T08:07:12.501782Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-12-28T08:07:12.502000Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-12-28T08:07:12.502343Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-12-28T08:07:21.524308Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-12-29T08:09:33.695756Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_195] 2022-12-29T08:09:33.696438Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-12-29T08:09:33.705737Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-12-29T08:09:33.705984Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-12-29T08:09:33.706178Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-12-29T08:09:33.706615Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-12-29T08:09:42.726574Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-12-30T08:08:19.840291Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_196] 2022-12-30T08:08:19.840928Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-12-30T08:08:19.841051Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-12-30T08:08:19.841268Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-12-30T08:08:19.848089Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-12-30T08:08:19.848552Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-12-30T08:08:28.868307Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2022-12-31T08:01:52.770495Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_197] 2022-12-31T08:01:52.771131Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2022-12-31T08:01:52.771246Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2022-12-31T08:01:52.771469Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2022-12-31T08:01:52.771652Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2022-12-31T08:01:52.772079Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2022-12-31T08:02:01.798405Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2023-01-01T08:01:51.014027Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_198] 2023-01-01T08:01:51.014710Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-01-01T08:01:51.014830Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-01-01T08:01:51.015051Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-01-01T08:01:51.015277Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-01-01T08:01:51.015678Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-01-01T08:02:00.035034Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2023-01-02T08:09:52.124738Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_199] 2023-01-02T08:09:52.125393Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-01-02T08:09:52.125521Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-01-02T08:09:52.125755Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-01-02T08:09:52.125966Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-01-02T08:09:52.133036Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-01-02T08:10:01.148488Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2023-01-03T08:08:16.984218Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_200] 2023-01-03T08:08:16.984882Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-01-03T08:08:16.985000Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-01-03T08:08:16.985244Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-01-03T08:08:16.985464Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-01-03T08:08:16.992437Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-01-03T08:08:26.012470Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2023-01-04T08:06:12.010751Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_201] 2023-01-04T08:06:12.011394Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-01-04T08:06:12.011517Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-01-04T08:06:12.011777Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-01-04T08:06:12.011980Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-01-04T08:06:12.019064Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-01-04T08:06:21.034763Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2023-01-05T08:06:56.280474Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_202] 2023-01-05T08:06:56.281168Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-01-05T08:06:56.281288Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-01-05T08:06:56.281530Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-01-05T08:06:56.281735Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-01-05T08:06:56.282259Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-01-05T08:07:05.305278Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2023-01-06T08:04:27.876802Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_203] 2023-01-06T08:04:27.877458Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-01-06T08:04:27.877653Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-01-06T08:04:27.883930Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-01-06T08:04:27.884222Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-01-06T08:04:27.884714Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-01-06T08:04:36.903256Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2023-01-07T13:46:13.612633Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_204] 2023-01-07T13:46:13.619948Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-01-07T13:46:13.620097Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-01-07T13:46:13.620333Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-01-07T13:46:13.620523Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-01-07T13:46:13.620998Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-01-07T13:46:22.640837Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2023-01-08T14:13:42.006775Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_205] 2023-01-08T14:13:42.007439Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-01-08T14:13:42.007569Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-01-08T14:13:42.007805Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-01-08T14:13:42.007995Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-01-08T14:13:42.015080Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-01-08T14:13:51.031273Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2023-01-09T08:15:12.829095Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_205] 2023-01-09T08:15:12.836252Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-01-09T08:15:12.836393Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-01-09T08:15:12.836630Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-01-09T08:15:12.837874Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-01-09T08:15:12.838379Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-01-09T08:15:21.869819Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2023-01-09T13:44:45.250142Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_206] 2023-01-09T13:44:45.250787Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-01-09T13:44:45.250909Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-01-09T13:44:45.251144Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-01-09T13:44:45.251358Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-01-09T13:44:45.251689Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-01-09T13:44:54.274122Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2023-01-10T13:40:57.500878Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_207] 2023-01-10T13:40:57.501542Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-01-10T13:40:57.501692Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-01-10T13:40:57.501928Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-01-10T13:40:57.502121Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-01-10T13:40:57.502460Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-01-10T13:41:06.522467Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2023-01-11T13:13:28.603344Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_208] 2023-01-11T13:13:28.603994Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-01-11T13:13:28.604113Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-01-11T13:13:28.604339Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-01-11T13:13:28.604530Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-01-11T13:13:28.604964Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-01-11T13:13:37.621417Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2023-01-12T08:06:18.157578Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_209] 2023-01-12T08:06:18.164919Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-01-12T08:06:18.165044Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-01-12T08:06:18.165273Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-01-12T08:06:18.165488Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-01-12T08:06:18.165944Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-01-12T08:06:27.184921Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2023-01-13T08:06:12.422878Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_210] 2023-01-13T08:06:12.423590Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-01-13T08:06:12.423710Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-01-13T08:06:12.429541Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-01-13T08:06:12.429827Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-01-13T08:06:12.430227Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-01-13T08:06:21.450964Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2023-01-14T08:04:26.213463Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_211] 2023-01-14T08:04:26.221120Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-01-14T08:04:26.221282Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-01-14T08:04:26.221525Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-01-14T08:04:26.221755Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-01-14T08:04:26.222226Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-01-14T08:04:35.260419Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2023-01-15T08:06:31.962471Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_212] 2023-01-15T08:06:31.969781Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-01-15T08:06:31.969909Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-01-15T08:06:31.970147Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-01-15T08:06:31.970388Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-01-15T08:06:31.970817Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-01-15T08:06:40.992000Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2023-01-16T08:07:55.507552Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_213] 2023-01-16T08:07:55.508187Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-01-16T08:07:55.508329Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-01-16T08:07:55.508563Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-01-16T08:07:55.508764Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-01-16T08:07:55.516096Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-01-16T08:08:04.559810Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2023-01-17T08:09:40.297957Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_214] 2023-01-17T08:09:40.298640Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-01-17T08:09:40.298764Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-01-17T08:09:40.298998Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-01-17T08:09:40.299215Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-01-17T08:09:40.299651Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-01-17T08:09:49.321114Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] kWatcher Agent related processes" pkill -SIGKILL NetworkWatcher } disable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $fi 2023-01-18T09:19:01.377574Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_214] 2023-01-18T09:19:01.402804Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-01-18T09:19:01.402932Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-01-18T09:19:01.411753Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-01-18T09:19:01.419444Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-01-18T09:19:01.419846Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-01-18T09:19:11.440637Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-01-18T14:27:05.402198Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_215] 2023-01-18T14:27:05.402947Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-01-18T14:27:05.409158Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-01-18T14:27:05.409404Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-01-18T14:27:05.409712Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-01-18T14:27:05.410498Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-01-18T14:27:14.424520Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-01-19T08:06:26.158933Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_216] 2023-01-19T08:06:26.159565Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-01-19T08:06:26.159690Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-01-19T08:06:26.159909Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-01-19T08:06:26.160188Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-01-19T08:06:26.167321Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-01-19T08:06:35.184158Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-01-20T08:01:15.092371Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_217] 2023-01-20T08:01:15.093812Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-01-20T08:01:15.093931Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-01-20T08:01:15.094149Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-01-20T08:01:15.094451Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-01-20T08:01:15.094824Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-01-20T08:01:24.111869Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-01-21T08:03:32.681964Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_218] 2023-01-21T08:03:32.682762Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-01-21T08:03:32.682891Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-01-21T08:03:32.683142Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-01-21T08:03:32.683501Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-01-21T08:03:32.690688Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-01-21T08:03:41.704487Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-01-22T08:09:12.183370Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_219] 2023-01-22T08:09:12.184017Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-01-22T08:09:12.184125Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-01-22T08:09:12.184387Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-01-22T08:09:12.184715Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-01-22T08:09:12.185130Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-01-22T08:09:21.205470Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-01-23T08:09:32.942334Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_220] 2023-01-23T08:09:32.942984Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-01-23T08:09:32.943100Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-01-23T08:09:32.943322Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-01-23T08:09:32.943615Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-01-23T08:09:32.943949Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-01-23T08:09:41.969283Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-01-24T08:08:51.694527Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_221] 2023-01-24T08:08:51.695342Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-01-24T08:08:51.695447Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-01-24T08:08:51.695657Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-01-24T08:08:51.703652Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-01-24T08:08:51.704094Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-01-24T08:09:00.738412Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-01-25T08:09:01.374877Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_222] 2023-01-25T08:09:01.375607Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-01-25T08:09:01.375736Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-01-25T08:09:01.375962Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-01-25T08:09:01.376284Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-01-25T08:09:01.376656Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-01-25T08:09:10.390658Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-01-26T08:08:58.959903Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_223] 2023-01-26T08:08:58.967195Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-01-26T08:08:58.967321Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-01-26T08:08:58.967561Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-01-26T08:08:58.967892Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-01-26T08:08:58.968398Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-01-26T08:09:07.987368Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-01-27T08:02:46.795573Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_224] 2023-01-27T08:02:46.796202Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-01-27T08:02:46.796331Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-01-27T08:02:46.796565Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-01-27T08:02:46.796856Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-01-27T08:02:46.797250Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-01-27T08:02:55.818643Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-01-28T08:06:29.372262Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_225] 2023-01-28T08:06:29.372881Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-01-28T08:06:29.379600Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-01-28T08:06:29.379905Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-01-28T08:06:29.380241Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-01-28T08:06:29.380683Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-01-28T08:06:38.395111Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-01-29T02:08:01.060945Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_225] 2023-01-29T02:08:01.061557Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-01-29T02:08:01.061689Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-01-29T02:08:01.061923Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-01-29T02:08:01.062365Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-01-29T02:08:01.062724Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-01-29T02:08:10.087527Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-01-29T08:04:26.381136Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_226] 2023-01-29T08:04:26.381793Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-01-29T08:04:26.381905Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-01-29T08:04:26.382132Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-01-29T08:04:26.382452Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-01-29T08:04:26.382909Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-01-29T08:04:35.404262Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-01-30T08:04:51.298855Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_227] 2023-01-30T08:04:51.305751Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-01-30T08:04:51.305941Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-01-30T08:04:51.306180Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-01-30T08:04:51.306521Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-01-30T08:04:51.306882Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-01-30T08:05:00.321987Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-01-31T08:09:07.679004Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_228] 2023-01-31T08:09:07.680366Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-01-31T08:09:07.680483Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-01-31T08:09:07.680708Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-01-31T08:09:07.681062Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-01-31T08:09:07.681420Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-01-31T08:09:16.702511Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-02-01T08:03:25.562828Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2913967507320906261] 2023-02-01T08:03:25.563512Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-02-01T08:03:25.563631Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-02-01T08:03:25.563870Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-02-01T08:03:25.564211Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-02-01T08:03:25.564741Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-02-01T08:03:34.586548Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-02-01T16:49:56.498052Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12855004503587509678] 2023-02-01T16:49:56.498672Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-02-01T16:49:56.498784Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-02-01T16:49:56.505691Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-02-01T16:49:56.506173Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-02-01T16:53:11.667002Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12855004503587509678] 2023-02-01T16:53:11.668740Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-02-01T16:53:11.668858Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-02-01T16:53:11.669070Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-02-01T16:53:11.669762Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-02-01T16:53:11.670124Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-02-01T16:53:20.692682Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-02-02T08:08:36.890544Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6992233182118721739] 2023-02-02T08:08:36.897869Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-02-02T08:08:36.897993Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-02-02T08:08:36.898231Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-02-02T08:08:36.898529Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-02-02T08:08:36.898962Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-02-02T08:08:45.913109Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-02-03T08:04:57.716624Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1492739001968586923] 2023-02-03T08:04:57.717262Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-02-03T08:04:57.717388Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-02-03T08:04:57.717608Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-02-03T08:04:57.717901Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-02-03T08:04:57.718348Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-02-03T08:05:06.736629Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-02-04T08:09:13.520223Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12742605071236343549] 2023-02-04T08:09:13.520896Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-02-04T08:09:13.521021Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-02-04T08:09:13.521245Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-02-04T08:09:13.521531Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-02-04T08:09:13.521970Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-02-04T08:09:22.543323Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-02-05T08:08:51.891391Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_18134776216229031815] 2023-02-05T08:08:51.892064Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-02-05T08:08:51.892188Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-02-05T08:08:51.892418Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-02-05T08:08:51.892755Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-02-05T08:08:51.893173Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-02-05T08:09:00.918226Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-02-06T08:08:48.391416Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3212380312342810201] 2023-02-06T08:08:48.392017Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-02-06T08:08:48.392135Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-02-06T08:08:48.392397Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-02-06T08:08:48.392668Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-02-06T08:08:48.393044Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-02-06T08:08:57.411809Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-02-07T08:05:54.951259Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15281114621022957412] 2023-02-07T08:05:54.951899Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-02-07T08:05:54.952016Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-02-07T08:05:54.952243Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-02-07T08:05:54.959236Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-02-07T08:05:54.959720Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-02-07T08:06:03.982576Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-02-08T08:10:16.781417Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9369752803861428598] 2023-02-08T08:10:16.782151Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-02-08T08:10:16.782270Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-02-08T08:10:16.782489Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-02-08T08:10:16.782832Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-02-08T08:10:16.783293Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-02-08T08:10:25.803273Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-02-09T08:09:37.435425Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4218607362048627009] 2023-02-09T08:09:37.442652Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-02-09T08:09:37.442804Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-02-09T08:09:37.443033Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-02-09T08:09:37.443367Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-02-09T08:09:37.443764Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-02-09T08:09:46.458060Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-02-10T08:01:09.050612Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8333397181878859644] 2023-02-10T08:01:09.051191Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-02-10T08:01:09.057944Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-02-10T08:01:09.058310Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-02-10T08:01:09.058639Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-02-10T08:01:09.059051Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-02-10T08:01:18.085407Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-02-11T08:03:43.619516Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8033313392864496111] 2023-02-11T08:03:43.620123Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-02-11T08:03:43.626870Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-02-11T08:03:43.627178Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-02-11T08:03:43.627584Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-02-11T08:03:43.627993Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-02-11T08:03:52.642544Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-02-11T09:20:23.415812Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_914133758414282664] 2023-02-11T09:20:23.423110Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-02-11T09:20:23.423244Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-02-11T09:20:23.423468Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-02-11T09:20:23.423793Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-02-11T09:20:23.424153Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-02-11T09:20:32.440845Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-02-12T08:06:19.452136Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_18393567574331094838] 2023-02-12T08:06:19.453759Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-02-12T08:06:19.453892Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-02-12T08:06:19.454161Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-02-12T08:06:19.454527Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-02-12T08:06:19.455039Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-02-12T08:06:28.473883Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-02-13T08:04:45.936396Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9298963918735786024] 2023-02-13T08:04:45.936982Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-02-13T08:04:45.937096Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-02-13T08:04:45.943990Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-02-13T08:04:45.944387Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-02-13T08:04:45.944753Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-02-13T08:04:54.958988Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-02-14T08:02:13.890477Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12304040796359096492] 2023-02-14T08:02:13.897726Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-02-14T08:02:13.897859Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-02-14T08:02:13.898101Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-02-14T08:02:13.898453Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-02-14T08:02:13.898859Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-02-14T08:02:22.913298Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-02-15T08:04:17.664828Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4269794868170624822] 2023-02-15T08:04:17.665444Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-02-15T08:04:17.665555Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-02-15T08:04:17.665778Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-02-15T08:04:17.672233Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-02-15T08:04:17.672681Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-02-15T08:04:26.693855Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-02-16T08:04:54.711717Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3339541061387685835] 2023-02-16T08:04:54.712387Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-02-16T08:04:54.712505Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-02-16T08:04:54.712742Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-02-16T08:04:54.713099Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-02-16T08:04:54.720227Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-02-16T08:05:03.738018Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-02-17T08:04:06.466567Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1569902453967177181] 2023-02-17T08:04:06.467195Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-02-17T08:04:06.467313Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-02-17T08:04:06.474187Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-02-17T08:04:06.474564Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-02-17T08:04:06.475016Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-02-17T08:04:15.489289Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-02-18T08:05:06.632610Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15393678431768791038] 2023-02-18T08:05:06.640003Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-02-18T08:05:06.640145Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-02-18T08:05:06.640373Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-02-18T08:05:06.640687Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-02-18T08:05:06.641158Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-02-18T08:05:15.655690Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-02-19T08:03:35.605373Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5998079248753190837] 2023-02-19T08:03:35.606025Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-02-19T08:03:35.606149Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-02-19T08:03:35.606369Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-02-19T08:03:35.613282Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-02-19T08:03:35.613675Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-02-19T08:03:44.628481Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-02-20T08:09:51.166168Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11593098774685107294] 2023-02-20T08:09:51.166863Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-02-20T08:09:51.166981Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-02-20T08:09:51.167206Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-02-20T08:09:51.167599Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-02-20T08:09:51.168041Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-02-20T08:10:00.189651Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-02-21T08:04:04.352517Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12279428234698269486] 2023-02-21T08:04:04.359964Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-02-21T08:04:04.360101Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-02-21T08:04:04.360346Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-02-21T08:04:04.360776Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-02-21T08:04:04.361264Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-02-21T08:04:13.379820Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-02-22T08:09:00.824187Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3371076656346954206] 2023-02-22T08:09:00.825255Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-02-22T08:09:00.825391Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-02-22T08:09:00.825658Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-02-22T08:09:00.826030Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-02-22T08:09:00.826396Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-02-22T08:09:09.850348Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-02-23T08:05:12.612265Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_957028480729649594] 2023-02-23T08:05:12.612973Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-02-23T08:05:12.613097Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-02-23T08:05:12.620016Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-02-23T08:05:12.620432Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-02-23T08:05:12.620830Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-02-23T08:05:21.637859Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-02-24T08:04:59.626885Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5374761526584917812] 2023-02-24T08:04:59.627531Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-02-24T08:04:59.627642Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-02-24T08:04:59.627864Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-02-24T08:04:59.628156Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-02-24T08:04:59.628505Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-02-24T08:05:08.650818Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-02-25T08:10:19.975293Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12954895732496049538] 2023-02-25T08:10:19.982644Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-02-25T08:10:19.982767Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-02-25T08:10:19.982996Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-02-25T08:10:19.983298Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-02-25T08:10:19.983651Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-02-25T08:10:28.998165Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-02-26T08:03:32.182856Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_13976819693403278778] 2023-02-26T08:03:32.183543Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-02-26T08:03:32.183655Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-02-26T08:03:32.183883Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-02-26T08:03:32.184223Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-02-26T08:03:32.184566Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-02-26T08:03:41.207896Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-02-27T08:04:58.473762Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15540187502915483856] 2023-02-27T08:04:58.480949Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-02-27T08:04:58.481073Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-02-27T08:04:58.481303Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-02-27T08:04:58.481653Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-02-27T08:04:58.482069Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-02-27T08:05:07.495480Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-02-28T08:10:35.708469Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5515397920255243481] 2023-02-28T08:10:35.709208Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-02-28T08:10:35.709324Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-02-28T08:10:35.709560Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-02-28T08:10:35.709867Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-02-28T08:10:35.710303Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-02-28T08:10:44.728504Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-03-01T08:07:21.764753Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5175695016795137383] 2023-03-01T08:07:21.765402Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-03-01T08:07:21.765534Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-03-01T08:07:21.765765Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-03-01T08:07:21.766085Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-03-01T08:07:21.766560Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-03-01T08:07:30.786918Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-03-02T08:05:54.249640Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_18220648496415543484] 2023-03-02T08:05:54.250372Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-03-02T08:05:54.250489Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-03-02T08:05:54.250716Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-03-02T08:05:54.251015Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-03-02T08:05:54.251462Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-03-02T08:06:03.273299Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-03-03T08:08:12.323429Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12575482503086861607] 2023-03-03T08:08:12.324132Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-03-03T08:08:12.324250Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-03-03T08:08:12.324506Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-03-03T08:08:12.331462Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-03-03T08:08:12.331895Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-03-03T08:08:21.346773Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-03-04T08:06:37.848313Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11644362255294368637] 2023-03-04T08:06:37.848952Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-03-04T08:06:37.849083Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-03-04T08:06:37.849313Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-03-04T08:06:37.849620Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-03-04T08:06:37.850045Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-03-04T08:06:46.869670Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-03-05T08:03:29.154002Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12034971960133828206] 2023-03-05T08:03:29.154631Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-03-05T08:03:29.154746Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-03-05T08:03:29.154972Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-03-05T08:03:29.155281Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-03-05T08:03:29.162293Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-03-05T08:03:38.176747Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-03-06T08:03:21.002968Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15342161232606807248] 2023-03-06T08:03:21.003614Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-03-06T08:03:21.003729Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-03-06T08:03:21.003950Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-03-06T08:03:21.010989Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-03-06T08:03:21.011506Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-03-06T08:03:30.034888Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-03-07T08:00:43.614131Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3269165283023621577] 2023-03-07T08:00:43.615337Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-03-07T08:00:43.615474Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-03-07T08:00:43.615707Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-03-07T08:00:43.616055Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-03-07T08:00:43.616519Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-03-07T08:00:52.634917Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-03-08T08:10:57.643339Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7693472217584962751] 2023-03-08T08:10:57.644061Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-03-08T08:10:57.644186Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-03-08T08:10:57.644423Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-03-08T08:10:57.644768Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-03-08T08:10:57.645195Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-03-08T08:11:06.665958Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-03-09T02:10:12.682776Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7693472217584962751] 2023-03-09T02:10:12.683418Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-03-09T02:10:12.690306Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-03-09T02:10:12.690622Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-03-09T02:10:12.691202Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-03-09T02:10:12.691636Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-03-09T02:10:21.722265Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-03-09T08:04:45.075064Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15722167391270891055] 2023-03-09T08:04:45.075725Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-03-09T08:04:45.075840Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-03-09T08:04:45.076095Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-03-09T08:04:45.076380Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-03-09T08:04:45.076746Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-03-09T08:04:54.098117Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-03-10T08:04:03.470710Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9089099394405569953] 2023-03-10T08:04:03.471385Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-03-10T08:04:03.471500Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-03-10T08:04:03.471727Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-03-10T08:04:03.472039Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-03-10T08:04:03.472478Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-03-10T08:04:12.492886Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-03-11T08:09:53.249545Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2886050022152935791] 2023-03-11T08:09:53.250177Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-03-11T08:09:53.256940Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-03-11T08:09:53.257211Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-03-11T08:09:53.257533Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-03-11T08:09:53.257895Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-03-11T08:10:02.272745Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-03-12T08:10:15.192445Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4763965927807807114] 2023-03-12T08:10:15.193293Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-03-12T08:10:15.193423Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-03-12T08:10:15.193657Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-03-12T08:10:15.194034Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-03-12T08:10:15.200842Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-03-12T08:10:24.215530Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-03-13T08:07:16.902887Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5588992249101437990] 2023-03-13T08:07:16.903558Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-03-13T08:07:16.903680Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-03-13T08:07:16.903912Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-03-13T08:07:16.904445Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-03-13T08:07:16.911371Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-03-13T08:07:25.925921Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-03-14T08:02:22.758388Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14802981949640570405] 2023-03-14T08:02:22.758995Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-03-14T08:02:22.759127Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-03-14T08:02:22.759359Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-03-14T08:02:22.759640Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-03-14T08:02:22.759944Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-03-14T08:02:31.781968Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-03-15T08:04:19.266225Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6080884378412881962] 2023-03-15T08:04:19.267049Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-03-15T08:04:19.267211Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-03-15T08:04:19.267449Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-03-15T08:04:19.267743Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-03-15T08:04:19.268125Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-03-15T08:04:28.294368Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-03-16T08:05:33.364888Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_825187568963745345] 2023-03-16T08:05:33.365546Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-03-16T08:05:33.365663Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-03-16T08:05:33.366036Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-03-16T08:05:33.366402Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-03-16T08:05:33.366808Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-03-16T08:05:42.388077Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-03-17T08:04:29.586888Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_13425041500792177640] 2023-03-17T08:04:29.587535Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-03-17T08:04:29.594332Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-03-17T08:04:29.594908Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-03-17T08:04:29.595341Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-03-17T08:04:29.595852Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-03-17T08:04:38.610079Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-03-18T08:03:59.105399Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12844854954635808995] 2023-03-18T08:03:59.106041Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-03-18T08:03:59.106150Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-03-18T08:03:59.106374Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-03-18T08:03:59.106717Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-03-18T08:03:59.107068Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-03-18T08:04:08.135326Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-03-19T08:09:21.266574Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11257277225871068929] 2023-03-19T08:09:21.273985Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-03-19T08:09:21.274140Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-03-19T08:09:21.274385Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-03-19T08:09:21.274686Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-03-19T08:09:21.275074Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-03-19T08:09:30.293782Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-03-20T08:05:01.698908Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16230682991726550177] 2023-03-20T08:05:01.699932Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-03-20T08:05:01.700284Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-03-20T08:05:01.700757Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-03-20T08:05:01.708082Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-03-20T08:05:01.708552Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-03-20T08:05:10.748098Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-03-21T08:07:03.731323Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12381072794729006175] 2023-03-21T08:07:03.732061Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-03-21T08:07:03.732187Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-03-21T08:07:03.732420Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-03-21T08:07:03.732717Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-03-21T08:07:03.733140Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-03-21T08:07:12.753149Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-03-22T02:08:05.077915Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12381072794729006175] 2023-03-22T02:08:05.078581Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-03-22T02:08:05.078695Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-03-22T02:08:05.078951Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-03-22T02:08:05.079420Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-03-22T02:08:05.086449Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-03-22T02:08:14.100402Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-03-22T08:07:12.855036Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16669368697713568440] 2023-03-22T08:07:12.862299Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-03-22T08:07:12.862448Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-03-22T08:07:12.862886Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-03-22T08:07:12.863384Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-03-22T08:07:12.863868Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-03-22T08:07:21.882625Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-03-23T08:09:43.098599Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10778211628176338245] 2023-03-23T08:09:43.099225Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-03-23T08:09:43.099342Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-03-23T08:09:43.106214Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-03-23T08:09:43.106583Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-03-23T08:09:43.107013Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-03-23T08:09:52.120993Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-03-24T08:09:31.170491Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4758624721776818605] 2023-03-24T08:09:31.171151Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-03-24T08:09:31.171284Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-03-24T08:09:31.171511Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-03-24T08:09:31.178501Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-03-24T08:09:31.178997Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-03-24T08:09:40.193070Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-03-25T08:04:55.686525Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6720157087089500642] 2023-03-25T08:04:55.687147Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-03-25T08:04:55.693937Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-03-25T08:04:55.694251Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-03-25T08:04:55.694571Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-03-25T08:04:55.694935Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-03-25T08:05:04.713473Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-03-26T08:09:02.061614Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8913857226107031023] 2023-03-26T08:09:02.069037Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-03-26T08:09:02.069205Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-03-26T08:09:02.069456Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-03-26T08:09:02.069815Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-03-26T08:09:02.070165Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-03-26T08:09:11.087319Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-03-27T08:04:34.562954Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2490192278231327461] 2023-03-27T08:04:34.570825Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-03-27T08:04:34.570952Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-03-27T08:04:34.571215Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-03-27T08:04:34.571609Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-03-27T08:04:34.571993Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-03-27T08:04:43.586563Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-03-28T08:03:38.882045Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15229872514865995613] 2023-03-28T08:03:38.889367Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-03-28T08:03:38.889492Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-03-28T08:03:38.889725Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-03-28T08:03:38.890040Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-03-28T08:03:38.890475Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-03-28T08:03:47.905650Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-03-29T08:09:48.450685Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5596426813745863406] 2023-03-29T08:09:48.451335Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-03-29T08:09:48.451453Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-03-29T08:09:48.451700Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-03-29T08:09:48.458801Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-03-29T08:09:48.459311Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-03-29T08:09:57.480973Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-03-30T08:04:35.045653Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10059938660609536227] 2023-03-30T08:04:35.052143Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-03-30T08:04:35.052305Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-03-30T08:04:35.052537Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-03-30T08:04:35.052852Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-03-30T08:04:35.053222Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-03-30T08:04:44.073722Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-03-31T08:05:55.514470Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5788790010026920047] 2023-03-31T08:05:55.521792Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-03-31T08:05:55.521916Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-03-31T08:05:55.522146Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-03-31T08:05:55.522455Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-03-31T08:05:55.522895Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-03-31T08:06:04.537500Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-04-01T08:08:45.985241Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14928029813527448827] 2023-04-01T08:08:45.992558Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-04-01T08:08:45.992717Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-04-01T08:08:45.992960Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-04-01T08:08:45.993272Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-04-01T08:08:45.993731Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-04-01T08:08:55.007735Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-04-02T08:01:19.601775Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6354812822859249328] 2023-04-02T08:01:19.602463Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-04-02T08:01:19.602586Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-04-02T08:01:19.602849Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-04-02T08:01:19.603152Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-04-02T08:01:19.603591Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-04-02T08:01:28.625564Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-04-03T08:01:10.538192Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9139459369854157879] 2023-04-03T08:01:10.539449Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-04-03T08:01:10.539580Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-04-03T08:01:10.539807Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-04-03T08:01:10.540204Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-04-03T08:01:10.540658Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-04-03T08:01:19.559185Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-04-04T08:08:48.671222Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1097717534645353957] 2023-04-04T08:08:48.678607Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-04-04T08:08:48.678738Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-04-04T08:08:48.678977Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-04-04T08:08:48.679270Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-04-04T08:08:48.679721Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-04-04T08:08:57.699039Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-04-05T08:08:46.657515Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15141305181757409092] 2023-04-05T08:08:46.665224Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-04-05T08:08:46.665344Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-04-05T08:08:46.665564Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-04-05T08:08:46.665947Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-04-05T08:08:46.666294Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-04-05T08:08:55.684306Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-04-06T08:02:33.181903Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_13080973551728900888] 2023-04-06T08:02:33.189652Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-04-06T08:02:33.189767Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-04-06T08:02:33.189985Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-04-06T08:02:33.190580Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-04-06T08:02:33.190932Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-04-06T08:02:42.208910Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-04-07T08:06:03.318008Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16476925626587842119] 2023-04-07T08:06:03.325311Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-04-07T08:06:03.325420Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-04-07T08:06:03.325665Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-04-07T08:06:03.325964Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-04-07T08:06:03.326292Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-04-07T08:06:12.345026Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-04-08T08:07:10.573478Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15294091642161380216] 2023-04-08T08:07:10.574131Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-04-08T08:07:10.574248Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-04-08T08:07:10.574500Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-04-08T08:07:10.574802Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-04-08T08:07:10.575113Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-04-08T08:07:19.596561Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-04-09T08:05:19.374349Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16114365484013029080] 2023-04-09T08:05:19.375044Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-04-09T08:05:19.375163Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-04-09T08:05:19.375399Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-04-09T08:05:19.375739Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-04-09T08:05:19.376075Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-04-09T08:05:28.397575Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-04-10T08:10:28.164997Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_822969503056723476] 2023-04-10T08:10:28.165652Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-04-10T08:10:28.165766Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-04-10T08:10:28.165991Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-04-10T08:10:28.166297Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-04-10T08:10:28.166665Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-04-10T08:10:37.187693Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-04-11T08:05:07.315396Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8233234853126717792] 2023-04-11T08:05:07.316403Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-04-11T08:05:07.316535Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-04-11T08:05:07.316767Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-04-11T08:05:07.317094Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-04-11T08:05:07.317460Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-04-11T08:05:16.331908Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-04-12T08:09:22.143427Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_13368842913950612943] 2023-04-12T08:09:22.144099Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-04-12T08:09:22.144226Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-04-12T08:09:22.144458Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-04-12T08:09:22.144786Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-04-12T08:09:22.145119Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-04-12T08:09:31.166856Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-04-13T08:01:39.424378Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6660009322500828919] 2023-04-13T08:01:39.431668Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-04-13T08:01:39.431798Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-04-13T08:01:39.432027Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-04-13T08:01:39.432340Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-04-13T08:01:39.432686Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-04-13T08:01:48.453234Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-04-14T08:03:40.888785Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9280446428371105674] 2023-04-14T08:03:40.889417Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-04-14T08:03:40.889532Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-04-14T08:03:40.889759Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-04-14T08:03:40.890089Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-04-14T08:03:40.890421Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-04-14T08:03:49.911577Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-04-15T08:07:36.753899Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16486406964245556087] 2023-04-15T08:07:36.755390Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-04-15T08:07:36.755514Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-04-15T08:07:36.755741Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-04-15T08:07:36.756085Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-04-15T08:07:36.756461Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-04-15T08:07:45.775991Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-04-16T08:03:56.693617Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2834394273216380647] 2023-04-16T08:03:56.694311Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-04-16T08:03:56.694442Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-04-16T08:03:56.694675Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-04-16T08:03:56.694985Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-04-16T08:03:56.698992Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-04-16T08:04:05.713949Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-04-17T08:00:26.948729Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11576768566085818312] 2023-04-17T08:00:26.956123Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-04-17T08:00:26.956262Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-04-17T08:00:26.956493Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-04-17T08:00:26.956809Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-04-17T08:00:26.957188Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-04-17T08:00:35.972080Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-04-18T08:07:16.288991Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_13527077044467885739] 2023-04-18T08:07:16.290517Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-04-18T08:07:16.290631Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-04-18T08:07:16.290844Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-04-18T08:07:16.291220Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-04-18T08:07:16.291568Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-04-18T08:07:25.309275Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-04-19T08:03:13.732926Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14846642175209865387] 2023-04-19T08:03:13.733546Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-04-19T08:03:13.733661Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-04-19T08:03:13.733905Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-04-19T08:03:13.740901Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-04-19T08:03:13.741374Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-04-19T08:03:22.755508Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-04-20T08:10:13.161305Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12629182861600837150] 2023-04-20T08:10:13.161995Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-04-20T08:10:13.162115Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-04-20T08:10:13.162337Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-04-20T08:10:13.162667Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-04-20T08:10:13.163016Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-04-20T08:10:22.184409Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-04-21T08:04:02.378240Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11666668096327887472] 2023-04-21T08:04:02.378990Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-04-21T08:04:02.379107Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-04-21T08:04:02.379336Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-04-21T08:04:02.379677Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-04-21T08:04:02.380030Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-04-21T08:04:11.400948Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-04-22T08:06:51.760372Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_755922762026774250] 2023-04-22T08:06:51.761190Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-04-22T08:06:51.761333Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-04-22T08:06:51.761614Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-04-22T08:06:51.768773Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-04-22T08:06:51.769204Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-04-22T08:07:00.789295Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-04-23T08:08:41.275711Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12621510151759769279] 2023-04-23T08:08:41.276423Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-04-23T08:08:41.276540Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-04-23T08:08:41.276797Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-04-23T08:08:41.277131Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-04-23T08:08:41.277476Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-04-23T08:08:50.297756Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-04-24T08:10:07.367982Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_18405876332732296443] 2023-04-24T08:10:07.369084Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-04-24T08:10:07.369254Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-04-24T08:10:07.369534Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-04-24T08:10:07.369897Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-04-24T08:10:07.370336Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-04-24T08:10:16.390271Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-04-25T02:07:36.512719Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_18405876332732296443] 2023-04-25T02:07:36.519976Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-04-25T02:07:36.520107Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-04-25T02:07:36.520349Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-04-25T02:07:36.520804Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-04-25T02:07:36.521188Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-04-25T02:07:45.543372Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-04-25T08:07:37.056498Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1499065507866417021] 2023-04-25T08:07:37.057293Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-04-25T08:07:37.057413Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-04-25T08:07:37.057662Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-04-25T08:07:37.058011Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-04-25T08:07:37.058352Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-04-25T08:07:46.081724Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-04-26T08:04:08.980234Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3371541575692094374] 2023-04-26T08:04:08.980930Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-04-26T08:04:08.981050Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-04-26T08:04:08.981293Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-04-26T08:04:08.981643Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-04-26T08:04:08.981986Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-04-26T08:04:18.009031Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-04-27T08:05:12.754778Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6641052035983196222] 2023-04-27T08:05:12.762105Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-04-27T08:05:12.762290Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-04-27T08:05:12.762551Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-04-27T08:05:12.762900Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-04-27T08:05:12.763265Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-04-27T08:05:21.777522Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-04-28T08:09:20.487746Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11296447197105118213] 2023-04-28T08:09:20.488504Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-04-28T08:09:20.488628Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-04-28T08:09:20.488927Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-04-28T08:09:20.495963Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-04-28T08:09:20.496332Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-04-28T08:09:29.515870Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-04-29T08:09:14.594815Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_18181312779862108122] 2023-04-29T08:09:14.595604Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-04-29T08:09:14.595730Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-04-29T08:09:14.595972Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-04-29T08:09:14.596275Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-04-29T08:09:14.596622Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-04-29T08:09:23.618182Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-04-30T08:08:16.883412Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11398861362571980690] 2023-04-30T08:08:16.884031Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-04-30T08:08:16.884142Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-04-30T08:08:16.884403Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-04-30T08:08:16.884713Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-04-30T08:08:16.885039Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-04-30T08:08:25.902729Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-05-01T08:09:38.015100Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9687421264047824418] 2023-05-01T08:09:38.015997Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-05-01T08:09:38.016114Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-05-01T08:09:38.022812Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-05-01T08:09:38.023243Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-05-01T08:09:38.023630Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-05-01T08:09:47.046076Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-05-02T08:09:15.329709Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9473914193822140526] 2023-05-02T08:09:15.330434Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-05-02T08:09:15.330550Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-05-02T08:09:15.330794Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-05-02T08:09:15.331115Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-05-02T08:09:15.331479Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-05-02T08:09:24.351636Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-05-03T08:07:48.895443Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17786987023488918590] 2023-05-03T08:07:48.896153Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-05-03T08:07:48.896361Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-05-03T08:07:48.896628Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-05-03T08:07:48.896943Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-05-03T08:07:48.897337Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-05-03T08:07:57.919520Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-05-04T08:04:20.333052Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_13944798518022251897] 2023-05-04T08:04:20.333809Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-05-04T08:04:20.333928Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-05-04T08:04:20.334178Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-05-04T08:04:20.334504Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-05-04T08:04:20.341646Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-05-04T08:04:29.357012Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-05-05T08:04:02.715191Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17425204546200168831] 2023-05-05T08:04:02.715913Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-05-05T08:04:02.716038Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-05-05T08:04:02.716281Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-05-05T08:04:02.716621Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-05-05T08:04:02.717052Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-05-05T08:04:11.742013Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-05-06T08:05:03.935780Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8532854597299862164] 2023-05-06T08:05:03.936905Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-05-06T08:05:03.937022Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-05-06T08:05:03.937243Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-05-06T08:05:03.937598Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-05-06T08:05:03.938014Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-05-06T08:05:12.955890Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-05-07T08:02:19.090818Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1901383522722436107] 2023-05-07T08:02:19.091476Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-05-07T08:02:19.091597Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-05-07T08:02:19.098508Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-05-07T08:02:19.098984Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-05-07T08:02:19.099368Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-05-07T08:02:28.126035Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-05-08T08:01:09.778732Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_18297023068302637994] 2023-05-08T08:01:09.779414Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-05-08T08:01:09.779551Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-05-08T08:01:09.779809Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-05-08T08:01:09.780144Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-05-08T08:01:09.780531Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-05-08T08:01:18.801687Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-05-09T08:09:48.805397Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9024133392542076987] 2023-05-09T08:09:48.812826Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-05-09T08:09:48.812965Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-05-09T08:09:48.813202Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-05-09T08:09:48.813522Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-05-09T08:09:48.813879Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-05-09T08:09:57.832993Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-05-10T08:08:09.150829Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9593562692603940999] 2023-05-10T08:08:09.151508Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-05-10T08:08:09.151628Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-05-10T08:08:09.151859Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-05-10T08:08:09.152149Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-05-10T08:08:09.159109Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-05-10T08:08:18.173192Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-05-11T08:07:36.309325Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2305095762952086257] 2023-05-11T08:07:36.309999Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-05-11T08:07:36.310107Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-05-11T08:07:36.310343Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-05-11T08:07:36.310661Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-05-11T08:07:36.311099Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-05-11T08:07:45.330042Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-05-12T08:06:01.851875Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7574225771584469466] 2023-05-12T08:06:01.852524Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-05-12T08:06:01.852638Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-05-12T08:06:01.852898Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-05-12T08:06:01.853224Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-05-12T08:06:01.853628Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-05-12T08:06:10.875510Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-05-13T08:05:13.405598Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2537757461956030918] 2023-05-13T08:05:13.406242Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-05-13T08:05:13.413002Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-05-13T08:05:13.413398Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-05-13T08:05:13.413771Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-05-13T08:05:13.414209Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-05-13T08:05:22.428177Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-05-14T08:02:33.007048Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8016385066542782812] 2023-05-14T08:02:33.007730Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-05-14T08:02:33.007846Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-05-14T08:02:33.008086Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-05-14T08:02:33.008421Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-05-14T08:02:33.008893Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-05-14T08:02:42.030023Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-05-15T08:06:13.601881Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8162501146346422256] 2023-05-15T08:06:13.607567Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-05-15T08:06:13.607701Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-05-15T08:06:13.607947Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-05-15T08:06:13.610089Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-05-15T08:06:13.610590Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-05-15T08:06:22.625733Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-05-16T08:06:54.992883Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9795184757762050693] 2023-05-16T08:06:54.993593Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-05-16T08:06:54.993714Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-05-16T08:06:54.993977Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-05-16T08:06:54.994296Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-05-16T08:06:55.001444Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-05-16T08:07:04.016675Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-05-17T08:01:58.751056Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8778868282893682602] 2023-05-17T08:01:58.751806Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-05-17T08:01:58.751988Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-05-17T08:01:58.752237Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-05-17T08:01:58.759294Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-05-17T08:01:58.759876Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-05-17T08:02:07.774989Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-05-18T08:03:49.576448Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10740399332213550646] 2023-05-18T08:03:49.577229Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-05-18T08:03:49.577352Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-05-18T08:03:49.577597Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-05-18T08:03:49.577956Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-05-18T08:03:49.578337Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-05-18T08:03:58.600396Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-05-19T08:09:04.249494Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10198514025453439668] 2023-05-19T08:09:04.256804Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-05-19T08:09:04.256930Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-05-19T08:09:04.257196Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-05-19T08:09:04.257515Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-05-19T08:09:04.257857Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-05-19T08:09:13.277262Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-05-20T08:06:39.690626Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16904192543763438108] 2023-05-20T08:06:39.691230Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-05-20T08:06:39.691347Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-05-20T08:06:39.698271Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-05-20T08:06:39.698738Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-05-20T08:06:39.699176Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-05-20T08:06:48.713961Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-05-21T07:14:14.153553Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8694159363496050314] 2023-05-21T07:14:14.154805Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-05-21T07:14:14.154968Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-05-21T07:14:14.155297Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-05-21T07:14:14.155654Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-05-21T07:14:14.156080Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-05-21T07:14:23.177621Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-05-21T08:02:19.662065Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6949269775289821601] 2023-05-21T08:02:19.669243Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-05-21T08:02:19.669375Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-05-21T08:02:19.669602Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-05-21T08:02:19.669945Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-05-21T08:02:19.670311Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-05-21T08:02:28.685258Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-05-22T08:06:11.864818Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11934231591685690418] 2023-05-22T08:06:11.865452Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-05-22T08:06:11.865565Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-05-22T08:06:11.865816Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-05-22T08:06:11.866133Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-05-22T08:06:11.866510Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-05-22T08:06:20.889005Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-05-23T08:07:45.144888Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4963195326139445743] 2023-05-23T08:07:45.145530Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-05-23T08:07:45.145640Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-05-23T08:07:45.145900Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-05-23T08:07:45.146221Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-05-23T08:07:45.146586Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-05-23T08:07:54.167330Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-05-24T08:07:37.535812Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15819487997776900737] 2023-05-24T08:07:37.536595Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-05-24T08:07:37.536716Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-05-24T08:07:37.536964Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-05-24T08:07:37.537296Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-05-24T08:07:37.537739Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-05-24T08:07:46.559583Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-05-25T08:04:53.357903Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2863144222916646807] 2023-05-25T08:04:53.364554Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-05-25T08:04:53.365176Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-05-25T08:04:53.365790Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-05-25T08:04:53.366649Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-05-25T08:04:53.373998Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-05-25T08:05:02.394845Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-05-26T08:04:06.199889Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14981678950775808427] 2023-05-26T08:04:06.206358Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-05-26T08:04:06.206749Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-05-26T08:04:06.207260Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-05-26T08:04:06.207840Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-05-26T08:04:06.208541Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-05-26T08:04:15.236469Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-05-27T08:00:50.847112Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6921162291713826357] 2023-05-27T08:00:50.848211Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-05-27T08:00:50.848347Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-05-27T08:00:50.848584Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-05-27T08:00:50.849001Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-05-27T08:00:50.849509Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-05-27T08:00:59.867472Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-05-28T08:04:35.308874Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14459910854973558315] 2023-05-28T08:04:35.316263Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-05-28T08:04:35.316396Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-05-28T08:04:35.316645Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-05-28T08:04:35.316997Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-05-28T08:04:35.317430Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-05-28T08:04:44.332330Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-05-29T08:03:09.151022Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7169781429239585798] 2023-05-29T08:03:09.152247Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-05-29T08:03:09.159619Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-05-29T08:03:09.160241Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-05-29T08:03:09.160889Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-05-29T08:03:09.161601Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-05-29T08:03:18.212587Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-05-30T08:02:18.360049Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6000138239582413886] 2023-05-30T08:02:18.361505Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-05-30T08:02:18.361672Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-05-30T08:02:18.361953Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-05-30T08:02:18.362377Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-05-30T08:02:18.362844Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-05-30T08:02:27.388179Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-05-31T08:02:41.180963Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8455869968051164273] 2023-05-31T08:02:41.181794Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-05-31T08:02:41.181916Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-05-31T08:02:41.182153Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-05-31T08:02:41.182496Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-05-31T08:02:41.189588Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-05-31T08:02:50.204641Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-06-01T08:09:37.198313Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14907281168413540540] 2023-06-01T08:09:37.205715Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-06-01T08:09:37.205846Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-06-01T08:09:37.206112Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-06-01T08:09:37.206500Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-06-01T08:09:37.207004Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-06-01T08:09:46.228126Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-06-02T08:06:12.374544Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10131696739252863181] 2023-06-02T08:06:12.375338Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-06-02T08:06:12.375460Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-06-02T08:06:12.375704Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-06-02T08:06:12.382846Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-06-02T08:06:12.383425Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-06-02T08:06:21.398686Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-06-03T08:06:08.595544Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16209268506179296693] 2023-06-03T08:06:08.601827Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-06-03T08:06:08.601947Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-06-03T08:06:08.602182Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-06-03T08:06:08.602504Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-06-03T08:06:08.604153Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-06-03T08:06:17.622078Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-06-04T08:02:09.031815Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7719446257555123913] 2023-06-04T08:02:09.032649Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-06-04T08:02:09.039464Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-06-04T08:02:09.039864Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-06-04T08:02:09.040235Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-06-04T08:02:09.040697Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-06-04T08:02:18.054337Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-06-05T08:05:06.592161Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17264701553442344456] 2023-06-05T08:05:06.592863Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-06-05T08:05:06.592983Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-06-05T08:05:06.593223Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-06-05T08:05:06.600237Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-06-05T08:05:06.600829Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-06-05T08:05:15.616032Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-06-06T08:03:44.283555Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10693986017803371080] 2023-06-06T08:03:44.291094Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-06-06T08:03:44.291216Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-06-06T08:03:44.291458Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-06-06T08:03:44.291796Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-06-06T08:03:44.292201Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-06-06T08:03:53.313726Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-06-07T08:07:39.823574Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5084188525856334783] 2023-06-07T08:07:39.830955Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-06-07T08:07:39.831113Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-06-07T08:07:39.831356Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-06-07T08:07:39.831714Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-06-07T08:07:39.832119Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-06-07T08:07:48.852098Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-06-08T08:06:27.219440Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8899355476069039469] 2023-06-08T08:06:27.220184Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-06-08T08:06:27.220305Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-06-08T08:06:27.220536Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-06-08T08:06:27.220861Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-06-08T08:06:27.221250Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-06-08T08:06:36.242601Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-06-09T03:03:48.038843Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5321974424236234916] 2023-06-09T03:03:48.046086Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-06-09T03:03:48.046206Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-06-09T03:03:48.046470Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-06-09T03:03:48.046789Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-06-09T03:03:48.047159Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-06-09T03:03:57.066573Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-06-09T08:07:13.534709Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15478562419113467798] 2023-06-09T08:07:13.535432Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-06-09T08:07:13.535560Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-06-09T08:07:13.542692Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-06-09T08:07:13.543097Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-06-09T08:07:13.543694Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-06-09T08:07:22.562695Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-06-10T08:03:45.093696Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15576099161663613996] 2023-06-10T08:03:45.094419Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-06-10T08:03:45.094538Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-06-10T08:03:45.094796Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-06-10T08:03:45.095146Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-06-10T08:03:45.095569Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-06-10T08:03:54.117062Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-06-11T08:10:38.161959Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5482268664492811447] 2023-06-11T08:10:38.163555Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-06-11T08:10:38.163691Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-06-11T08:10:38.163974Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-06-11T08:10:38.164394Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-06-11T08:10:38.164983Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-06-11T08:10:47.186308Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-06-12T08:03:10.859668Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1562732776346405014] 2023-06-12T08:03:10.860415Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-06-12T08:03:10.860535Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-06-12T08:03:10.860817Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-06-12T08:03:10.861157Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-06-12T08:03:10.868288Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-06-12T08:03:19.883693Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-06-13T08:10:01.954240Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8708761150527631419] 2023-06-13T08:10:01.962974Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-06-13T08:10:01.963121Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-06-13T08:10:01.963385Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-06-13T08:10:01.963770Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-06-13T08:10:01.972941Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-06-13T08:10:10.995017Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-06-14T08:09:07.848151Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_18270505311117115210] 2023-06-14T08:09:07.848967Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-06-14T08:09:07.849111Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-06-14T08:09:07.849357Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-06-14T08:09:07.849691Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-06-14T08:09:07.850108Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-06-14T08:09:16.872248Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-06-15T08:03:21.830897Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4352260885691811157] 2023-06-15T08:03:21.831563Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-06-15T08:03:21.831679Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-06-15T08:03:21.831912Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-06-15T08:03:21.832221Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-06-15T08:03:21.832626Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-06-15T08:03:30.855607Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-06-16T08:01:53.662790Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_218134036388053848] 2023-06-16T08:01:53.663444Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-06-16T08:01:53.663541Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-06-16T08:01:53.663811Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-06-16T08:01:53.664125Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-06-16T08:01:53.664455Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-06-16T08:02:02.683223Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-06-17T08:10:41.411522Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17942043669573318664] 2023-06-17T08:10:41.412718Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-06-17T08:10:41.412837Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-06-17T08:10:41.419202Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-06-17T08:10:41.419568Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-06-17T08:10:41.419938Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-06-17T08:10:50.434923Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-06-18T08:01:20.279061Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3055590718762833773] 2023-06-18T08:01:20.286510Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-06-18T08:01:20.286646Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-06-18T08:01:20.286926Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-06-18T08:01:20.287297Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-06-18T08:01:20.287764Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-06-18T08:01:29.309471Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-06-19T08:03:39.084047Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10971835155065913366] 2023-06-19T08:03:39.091533Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-06-19T08:03:39.091858Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-06-19T08:03:39.092106Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-06-19T08:03:39.092416Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-06-19T08:03:39.092867Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-06-19T08:03:48.111176Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-06-20T08:01:55.899563Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7309629867982330572] 2023-06-20T08:01:55.900275Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-06-20T08:01:55.900396Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-06-20T08:01:55.907265Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-06-20T08:01:55.907665Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-06-20T08:01:55.908078Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-06-20T08:02:04.923057Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-06-21T08:08:31.556480Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14335155132144298048] 2023-06-21T08:08:31.557450Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-06-21T08:08:31.557580Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-06-21T08:08:31.557825Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-06-21T08:08:31.558151Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-06-21T08:08:31.558619Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-06-21T08:08:40.580197Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-06-22T08:06:28.944500Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7261698746157513479] 2023-06-22T08:06:28.945250Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-06-22T08:06:28.945377Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-06-22T08:06:28.945630Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-06-22T08:06:28.945966Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-06-22T08:06:28.953122Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-06-22T08:06:37.968266Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-06-23T08:03:35.707805Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6533501140868051764] 2023-06-23T08:03:35.708478Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-06-23T08:03:35.708596Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-06-23T08:03:35.708878Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-06-23T08:03:35.716061Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-06-23T08:03:35.716586Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-06-23T08:03:44.731823Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-06-24T08:04:49.360408Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4494887112793687190] 2023-06-24T08:04:49.367843Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-06-24T08:04:49.368013Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-06-24T08:04:49.368266Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-06-24T08:04:49.368609Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-06-24T08:04:49.369092Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-06-24T08:04:58.384506Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-06-25T08:10:07.809022Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1330530430055010528] 2023-06-25T08:10:07.810452Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-06-25T08:10:07.810598Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-06-25T08:10:07.810891Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-06-25T08:10:07.811310Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-06-25T08:10:07.811914Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-06-25T08:10:16.832968Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-06-26T08:03:40.949751Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17318382734592026695] 2023-06-26T08:03:40.950428Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-06-26T08:03:40.957296Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-06-26T08:03:40.957655Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-06-26T08:03:40.958029Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-06-26T08:03:40.958481Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-06-26T08:03:49.978328Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-06-27T02:08:36.646699Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17318382734592026695] 2023-06-27T02:08:36.647555Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-06-27T02:08:36.647673Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-06-27T02:08:36.647910Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-06-27T02:08:36.648537Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-06-27T02:08:36.649020Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-06-27T02:08:45.685380Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-06-27T08:06:22.267563Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8574387848376656397] 2023-06-27T08:06:22.268421Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-06-27T08:06:22.268554Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-06-27T08:06:22.268796Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-06-27T08:06:22.269180Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-06-27T08:06:22.276687Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-06-27T08:06:31.298630Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-06-28T08:01:46.567934Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10928090659684214008] 2023-06-28T08:01:46.575400Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-06-28T08:01:46.575542Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-06-28T08:01:46.575802Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-06-28T08:01:46.576171Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-06-28T08:01:46.576645Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-06-28T08:01:55.594673Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-06-29T08:05:47.579484Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10178989488264496573] 2023-06-29T08:05:47.580280Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-06-29T08:05:47.580403Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-06-29T08:05:47.580654Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-06-29T08:05:47.581001Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-06-29T08:05:47.581470Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-06-29T08:05:56.602505Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-06-30T08:07:51.220467Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11717800867683927438] 2023-06-30T08:07:51.227997Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-06-30T08:07:51.228147Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-06-30T08:07:51.228397Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-06-30T08:07:51.228728Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-06-30T08:07:51.229241Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-06-30T08:08:00.249029Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-07-01T08:02:54.914754Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12633138933228006137] 2023-07-01T08:02:54.916222Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-07-01T08:02:54.916358Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-07-01T08:02:54.916605Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-07-01T08:02:54.916961Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-07-01T08:02:54.917389Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-07-01T08:03:03.938679Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-07-02T08:06:17.010671Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17994143055452744133] 2023-07-02T08:06:17.012078Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-07-02T08:06:17.012225Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-07-02T08:06:17.012475Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-07-02T08:06:17.012915Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-07-02T08:06:17.013442Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-07-02T08:06:26.038156Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-07-03T08:10:30.752088Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6276167410166344886] 2023-07-03T08:10:30.752736Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-07-03T08:10:30.752853Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-07-03T08:10:30.753083Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-07-03T08:10:30.753368Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-07-03T08:10:30.753767Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-07-03T08:10:39.772129Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-07-04T08:05:25.200438Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15222763173719624033] 2023-07-04T08:05:25.201098Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-07-04T08:05:25.201222Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-07-04T08:05:25.207951Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-07-04T08:05:25.208367Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-07-04T08:05:25.208836Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-07-04T08:05:34.229062Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-07-05T08:08:03.801387Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6547208233292327168] 2023-07-05T08:08:03.802125Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-07-05T08:08:03.802273Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-07-05T08:08:03.802524Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-07-05T08:08:03.802864Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-07-05T08:08:03.810059Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-07-05T08:08:12.824479Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-07-06T02:11:01.038896Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6547208233292327168] 2023-07-06T02:11:01.039566Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-07-06T02:11:01.039688Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-07-06T02:11:01.039930Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-07-06T02:11:01.040404Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-07-06T02:11:01.041027Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-07-06T02:11:10.062405Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-07-06T08:03:40.907345Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12016284758246243720] 2023-07-06T08:03:40.914820Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-07-06T08:03:40.914960Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-07-06T08:03:40.915232Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-07-06T08:03:40.915617Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-07-06T08:03:40.916026Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-07-06T08:03:49.935334Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-07-07T08:03:37.644999Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_634313910497987546] 2023-07-07T08:03:37.645712Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-07-07T08:03:37.652570Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-07-07T08:03:37.652867Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-07-07T08:03:37.653256Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-07-07T08:03:37.653655Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-07-07T08:03:46.668306Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-07-08T08:05:28.159758Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2562006075362679097] 2023-07-08T08:05:28.160912Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-07-08T08:05:28.161043Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-07-08T08:05:28.161275Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-07-08T08:05:28.161714Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-07-08T08:05:28.162202Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-07-08T08:05:37.182420Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-07-09T08:09:40.933623Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3008088869190899831] 2023-07-09T08:09:40.934747Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-07-09T08:09:40.934872Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-07-09T08:09:40.935108Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-07-09T08:09:40.942203Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-07-09T08:09:40.942751Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-07-09T08:09:49.958265Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-07-10T08:03:54.845016Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2698569886685281793] 2023-07-10T08:03:54.846112Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-07-10T08:03:54.846241Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-07-10T08:03:54.846485Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-07-10T08:03:54.846885Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-07-10T08:03:54.853893Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-07-10T08:04:03.869331Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-07-11T08:04:25.976382Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15342169249244792034] 2023-07-11T08:04:25.977752Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-07-11T08:04:25.977901Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-07-11T08:04:25.978173Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-07-11T08:04:25.978620Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-07-11T08:04:25.979168Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-07-11T08:04:34.996774Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-07-12T08:04:43.072349Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7091993968562446255] 2023-07-12T08:04:43.073246Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-07-12T08:04:43.073386Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-07-12T08:04:43.073658Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-07-12T08:04:43.074063Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-07-12T08:04:43.074481Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-07-12T08:04:52.098132Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-07-13T08:01:18.539476Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1696028841318700837] 2023-07-13T08:01:18.540270Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-07-13T08:01:18.540396Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-07-13T08:01:18.540645Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-07-13T08:01:18.541023Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-07-13T08:01:18.541492Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-07-13T08:01:27.563044Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-07-14T08:10:22.571776Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12165618605969322541] 2023-07-14T08:10:22.573034Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-07-14T08:10:22.573195Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-07-14T08:10:22.573464Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-07-14T08:10:22.573917Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-07-14T08:10:22.574349Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-07-14T08:10:31.595538Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-07-15T08:02:09.502361Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5116862979269956091] 2023-07-15T08:02:09.503136Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-07-15T08:02:09.509871Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-07-15T08:02:09.510241Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-07-15T08:02:09.510637Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-07-15T08:02:09.511083Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-07-15T08:02:18.526365Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-07-16T08:03:31.184157Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12586753145205017098] 2023-07-16T08:03:31.192155Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-07-16T08:03:31.192312Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-07-16T08:03:31.192611Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-07-16T08:03:31.193141Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-07-16T08:03:31.193735Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-07-16T08:03:40.219535Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-07-17T08:01:50.391025Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15420458839155581417] 2023-07-17T08:01:50.392012Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-07-17T08:01:50.392171Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-07-17T08:01:50.392432Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-07-17T08:01:50.392841Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-07-17T08:01:50.393536Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-07-17T08:01:59.413796Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-07-18T08:02:45.542694Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11403058504981819307] 2023-07-18T08:02:45.543440Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-07-18T08:02:45.543574Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-07-18T08:02:45.543850Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-07-18T08:02:45.549816Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-07-18T08:02:45.550334Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-07-18T08:02:54.574545Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-07-19T08:05:22.694512Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12295986653843386152] 2023-07-19T08:05:22.695317Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-07-19T08:05:22.695452Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-07-19T08:05:22.695709Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-07-19T08:05:22.696090Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-07-19T08:05:22.696574Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-07-19T08:05:31.715596Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-07-20T08:07:42.869162Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6745830399958293144] 2023-07-20T08:07:42.869923Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-07-20T08:07:42.870058Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-07-20T08:07:42.870325Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-07-20T08:07:42.877487Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-07-20T08:07:42.878022Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-07-20T08:07:51.893441Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-07-21T08:02:36.793398Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3766110555806974590] 2023-07-21T08:02:36.794054Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-07-21T08:02:36.794188Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-07-21T08:02:36.801114Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-07-21T08:02:36.801590Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-07-21T08:02:36.802124Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-07-21T08:02:45.832761Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-07-22T08:05:06.361664Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7655459412348506956] 2023-07-22T08:05:06.362415Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-07-22T08:05:06.362559Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-07-22T08:05:06.362814Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-07-22T08:05:06.369802Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-07-22T08:05:06.370504Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-07-22T08:05:15.386040Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-07-23T08:09:16.226087Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2246427790242976179] 2023-07-23T08:09:16.227345Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-07-23T08:09:16.227501Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-07-23T08:09:16.227794Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-07-23T08:09:16.228226Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-07-23T08:09:16.228851Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-07-23T08:09:25.250031Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-07-24T08:08:01.036871Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9728357804554016810] 2023-07-24T08:08:01.037638Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-07-24T08:08:01.037757Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-07-24T08:08:01.044662Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-07-24T08:08:01.045153Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-07-24T08:08:01.045720Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-07-24T08:08:10.068480Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-07-25T08:05:13.668353Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4025980534270134831] 2023-07-25T08:05:13.669394Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-07-25T08:05:13.669527Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-07-25T08:05:13.669884Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-07-25T08:05:13.670503Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-07-25T08:05:13.671144Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-07-25T08:05:22.693780Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-07-26T08:02:16.940064Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9862286375375187705] 2023-07-26T08:02:16.940913Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-07-26T08:02:16.941038Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-07-26T08:02:16.941349Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-07-26T08:02:16.941728Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-07-26T08:02:16.942319Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-07-26T08:02:25.965673Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-07-27T08:07:16.754089Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11696912533125434806] 2023-07-27T08:07:16.761486Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-07-27T08:07:16.761719Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-07-27T08:07:16.762109Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-07-27T08:07:16.762655Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-07-27T08:07:16.763387Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-07-27T08:07:25.782697Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-07-28T08:06:04.879125Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10610960076844754347] 2023-07-28T08:06:04.879903Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-07-28T08:06:04.880030Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-07-28T08:06:04.880278Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-07-28T08:06:04.880705Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-07-28T08:06:04.881213Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-07-28T08:06:13.913351Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-07-29T08:01:13.337451Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_18133592043611017412] 2023-07-29T08:01:13.338767Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-07-29T08:01:13.338935Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-07-29T08:01:13.339211Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-07-29T08:01:13.339624Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-07-29T08:01:13.340197Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-07-29T08:01:22.358865Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-07-30T08:06:47.346664Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9055687048568985934] 2023-07-30T08:06:47.347386Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-07-30T08:06:47.347516Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-07-30T08:06:47.354451Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-07-30T08:06:47.354966Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-07-30T08:06:47.355523Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-07-30T08:06:56.382727Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-07-31T08:04:52.271459Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4239089260724108507] 2023-07-31T08:04:52.272242Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-07-31T08:04:52.272354Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-07-31T08:04:52.272647Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-07-31T08:04:52.273024Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-07-31T08:04:52.273572Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-07-31T08:05:01.300871Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-08-01T08:02:19.936856Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10957464438618265616] 2023-08-01T08:02:19.938297Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-08-01T08:02:19.938455Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-08-01T08:02:19.938712Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-08-01T08:02:19.939101Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-08-01T08:02:19.939587Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-08-01T08:02:28.961494Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-08-02T08:03:46.921098Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6990489959695143439] 2023-08-02T08:03:46.928682Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-08-02T08:03:46.928835Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-08-02T08:03:46.929137Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-08-02T08:03:46.929479Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-08-02T08:03:46.929968Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-08-02T08:03:55.951982Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-08-03T08:09:21.027111Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_196738035829684970] 2023-08-03T08:09:21.027891Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-08-03T08:09:21.028007Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-08-03T08:09:21.028280Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-08-03T08:09:21.035448Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-08-03T08:09:21.036100Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-08-03T08:09:30.068523Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-08-04T08:07:13.913555Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_13740994963403070798] 2023-08-04T08:07:13.914457Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-08-04T08:07:13.914573Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-08-04T08:07:13.914820Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-08-04T08:07:13.915197Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-08-04T08:07:13.915661Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-08-04T08:07:22.936439Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-08-05T08:06:28.681694Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8511064047406144849] 2023-08-05T08:06:28.689114Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-08-05T08:06:28.689238Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-08-05T08:06:28.689471Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-08-05T08:06:28.689831Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-08-05T08:06:28.690358Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-08-05T08:06:37.704483Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-08-06T08:08:32.326182Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_2] 2023-08-06T08:08:32.326856Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-08-06T08:08:32.326971Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-08-06T08:08:32.327205Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-08-06T08:08:32.327512Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-08-06T08:08:32.328021Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-08-06T08:08:41.348397Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-08-07T08:05:25.879344Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8219538659666639750] 2023-08-07T08:05:25.886908Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-08-07T08:05:25.887067Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-08-07T08:05:25.887324Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-08-07T08:05:25.887743Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-08-07T08:05:25.888323Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-08-07T08:05:34.907433Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-08-08T08:07:39.009472Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3389522136789561647] 2023-08-08T08:07:39.010258Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-08-08T08:07:39.010381Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-08-08T08:07:39.010648Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-08-08T08:07:39.010997Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-08-08T08:07:39.011425Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-08-08T08:07:48.033220Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-08-09T02:08:01.117792Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3389522136789561647] 2023-08-09T02:08:01.118509Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-08-09T02:08:01.118618Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-08-09T02:08:01.118854Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-08-09T02:08:01.119358Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-08-09T02:08:01.126460Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-08-09T02:08:10.146293Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-08-09T08:02:17.323429Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10569324410840731407] 2023-08-09T08:02:17.324167Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-08-09T08:02:17.324272Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-08-09T08:02:17.324517Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-08-09T08:02:17.324958Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-08-09T08:02:17.325412Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-08-09T08:02:26.357624Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-08-10T08:07:48.162601Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14487282999227205923] 2023-08-10T08:07:48.170170Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-08-10T08:07:48.170327Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-08-10T08:07:48.170585Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-08-10T08:07:48.170971Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-08-10T08:07:48.171352Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-08-10T08:07:57.193110Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-08-11T08:06:09.759097Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5651789113642919249] 2023-08-11T08:06:09.759851Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-08-11T08:06:09.759983Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-08-11T08:06:09.767052Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-08-11T08:06:09.767531Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-08-11T08:06:09.767967Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-08-11T08:06:18.783199Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-08-12T08:02:29.541288Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17558847549574070772] 2023-08-12T08:02:29.544318Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-08-12T08:02:29.544463Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-08-12T08:02:29.544746Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-08-12T08:02:29.545234Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-08-12T08:02:29.545858Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-08-12T08:02:38.564011Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-08-13T08:03:32.918745Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11410945258252380819] 2023-08-13T08:03:32.920029Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-08-13T08:03:32.920202Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-08-13T08:03:32.920467Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-08-13T08:03:32.920918Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-08-13T08:03:32.921564Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-08-13T08:03:41.938919Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-08-14T08:05:22.441583Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11898462395146253222] 2023-08-14T08:05:22.442532Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-08-14T08:05:22.442655Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-08-14T08:05:22.442936Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-08-14T08:05:22.443279Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-08-14T08:05:22.450321Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-08-14T08:05:31.465943Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-08-15T08:03:54.045400Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2301331704272233211] 2023-08-15T08:03:54.052807Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-08-15T08:03:54.052978Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-08-15T08:03:54.053241Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-08-15T08:03:54.053656Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-08-15T08:03:54.054117Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-08-15T08:04:03.073570Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-08-16T08:04:25.806376Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15398362552468309189] 2023-08-16T08:04:25.807154Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-08-16T08:04:25.807281Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-08-16T08:04:25.814177Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-08-16T08:04:25.814636Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-08-16T08:04:25.815139Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-08-16T08:04:34.830418Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-08-17T08:01:25.221905Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5568966228437364426] 2023-08-17T08:01:25.222581Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-08-17T08:01:25.229346Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-08-17T08:01:25.229678Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-08-17T08:01:25.230121Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-08-17T08:01:25.230574Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-08-17T08:01:34.244962Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-08-18T08:02:15.169114Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11899891347094008021] 2023-08-18T08:02:15.169918Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-08-18T08:02:15.170048Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-08-18T08:02:15.170311Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-08-18T08:02:15.170715Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-08-18T08:02:15.171125Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-08-18T08:02:24.191705Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-08-19T08:02:07.195247Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11301740087214585468] 2023-08-19T08:02:07.196832Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-08-19T08:02:07.196988Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-08-19T08:02:07.197250Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-08-19T08:02:07.197724Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-08-19T08:02:07.198247Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-08-19T08:02:16.218559Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-08-20T08:07:38.629993Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2300963666468743258] 2023-08-20T08:07:38.631376Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-08-20T08:07:38.631522Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-08-20T08:07:38.631782Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-08-20T08:07:38.632286Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-08-20T08:07:38.632812Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-08-20T08:07:47.651673Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-08-21T08:06:58.573859Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16942525716164988501] 2023-08-21T08:06:58.574704Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-08-21T08:06:58.574845Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-08-21T08:06:58.575111Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-08-21T08:06:58.575481Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-08-21T08:06:58.582704Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-08-21T08:07:07.601292Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-08-22T08:02:04.643816Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5184346972866688220] 2023-08-22T08:02:04.644565Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-08-22T08:02:04.644757Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-08-22T08:02:04.645029Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-08-22T08:02:04.652152Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-08-22T08:02:04.652669Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-08-22T08:02:13.667759Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-08-23T08:02:39.974291Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5565714228877889067] 2023-08-23T08:02:39.975069Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-08-23T08:02:39.975200Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-08-23T08:02:39.975446Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-08-23T08:02:39.982589Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-08-23T08:02:39.983183Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-08-23T08:02:48.998420Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-08-24T08:00:56.544928Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1500265514658419681] 2023-08-24T08:00:56.545685Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-08-24T08:00:56.545806Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-08-24T08:00:56.552693Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-08-24T08:00:56.553146Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-08-24T08:00:56.553693Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-08-24T08:01:05.569595Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-08-25T08:02:53.658111Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3833574649157376425] 2023-08-25T08:02:53.665651Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-08-25T08:02:53.665829Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-08-25T08:02:53.666097Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-08-25T08:02:53.666465Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-08-25T08:02:53.667028Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-08-25T08:03:02.685309Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-08-26T08:08:15.229368Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4476697525058852663] 2023-08-26T08:08:15.230143Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-08-26T08:08:15.230280Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-08-26T08:08:15.230536Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-08-26T08:08:15.230923Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-08-26T08:08:15.231416Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-08-26T08:08:24.252364Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-08-27T08:03:56.119615Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16563621426743380673] 2023-08-27T08:03:56.120383Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-08-27T08:03:56.120507Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-08-27T08:03:56.120764Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-08-27T08:03:56.121104Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-08-27T08:03:56.121594Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-08-27T08:04:05.142928Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-08-28T08:08:15.303681Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17796092049296375545] 2023-08-28T08:08:15.311126Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-08-28T08:08:15.311285Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-08-28T08:08:15.311544Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-08-28T08:08:15.311927Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-08-28T08:08:15.312388Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-08-28T08:08:24.331944Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-08-29T08:01:47.581747Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7330954524820578814] 2023-08-29T08:01:47.589127Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-08-29T08:01:47.589268Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-08-29T08:01:47.589514Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-08-29T08:01:47.589911Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-08-29T08:01:47.590301Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-08-29T08:01:56.605286Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-08-30T08:05:38.257653Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15843879325881163902] 2023-08-30T08:05:38.258381Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-08-30T08:05:38.258500Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-08-30T08:05:38.258768Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-08-30T08:05:38.259145Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-08-30T08:05:38.259507Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-08-30T08:05:47.279371Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-08-31T08:09:03.025208Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4603951014496934755] 2023-08-31T08:09:03.025936Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-08-31T08:09:03.026061Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-08-31T08:09:03.026281Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-08-31T08:09:03.026679Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-08-31T08:09:03.027112Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-08-31T08:09:12.047424Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-09-01T08:01:33.485950Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16799250990838263857] 2023-09-01T08:01:33.486673Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-09-01T08:01:33.486809Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-09-01T08:01:33.487054Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-09-01T08:01:33.494326Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-09-01T08:01:33.494881Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-09-01T08:01:42.510137Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-09-02T08:03:54.207822Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10946231298970290604] 2023-09-02T08:03:54.209223Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-09-02T08:03:54.209367Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-09-02T08:03:54.209644Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-09-02T08:03:54.210150Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-09-02T08:03:54.210643Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-09-02T08:04:03.228180Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-09-03T08:06:40.460210Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7040114704483822432] 2023-09-03T08:06:40.461034Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-09-03T08:06:40.461165Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-09-03T08:06:40.461430Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-09-03T08:06:40.468543Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-09-03T08:06:40.469098Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-09-03T08:06:49.484333Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-09-04T08:02:06.967271Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10961618556290070640] 2023-09-04T08:02:06.967979Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-09-04T08:02:06.968119Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-09-04T08:02:06.968370Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-09-04T08:02:06.975380Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-09-04T08:02:06.975843Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-09-04T08:02:15.990497Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-09-05T08:06:27.464365Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7790283373578705077] 2023-09-05T08:06:27.465106Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-09-05T08:06:27.465219Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-09-05T08:06:27.465491Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-09-05T08:06:27.465866Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-09-05T08:06:27.466319Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-09-05T08:06:36.488745Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-09-06T08:02:46.114630Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3048535004520225826] 2023-09-06T08:02:46.122018Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-09-06T08:02:46.122232Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-09-06T08:02:46.122521Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-09-06T08:02:46.122964Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-09-06T08:02:46.123498Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-09-06T08:02:55.138738Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-09-07T08:04:03.703986Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4091024035123591489] 2023-09-07T08:04:03.704750Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-09-07T08:04:03.704874Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-09-07T08:04:03.705139Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-09-07T08:04:03.705535Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-09-07T08:04:03.706068Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-09-07T08:04:12.727778Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-09-08T08:07:39.457769Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2891936067893973606] 2023-09-08T08:07:39.458497Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-09-08T08:07:39.458620Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-09-08T08:07:39.458866Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-09-08T08:07:39.459217Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-09-08T08:07:39.459726Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-09-08T08:07:48.481822Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-09-09T08:06:04.729307Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6046027323702012905] 2023-09-09T08:06:04.730053Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-09-09T08:06:04.730220Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-09-09T08:06:04.730474Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-09-09T08:06:04.737587Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-09-09T08:06:04.738249Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-09-09T08:06:13.753493Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-09-10T08:04:06.974662Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8409056153544036173] 2023-09-10T08:04:06.975421Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-09-10T08:04:06.975545Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-09-10T08:04:06.975788Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-09-10T08:04:06.976181Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-09-10T08:04:06.983413Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-09-10T08:04:15.997792Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-09-11T08:05:02.775463Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1640995264207208163] 2023-09-11T08:05:02.776195Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-09-11T08:05:02.776317Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-09-11T08:05:02.776598Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-09-11T08:05:02.776950Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-09-11T08:05:02.784155Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-09-11T08:05:11.799622Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-09-12T08:07:33.664550Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14361596346003173391] 2023-09-12T08:07:33.665811Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-09-12T08:07:33.665976Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-09-12T08:07:33.666245Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-09-12T08:07:33.666664Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-09-12T08:07:33.667278Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-09-12T08:07:42.686312Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-09-13T08:01:17.014914Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3979010000509811286] 2023-09-13T08:01:17.015629Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-09-13T08:01:17.015753Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-09-13T08:01:17.016001Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-09-13T08:01:17.023123Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-09-13T08:01:17.023692Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-09-13T08:01:26.037537Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-09-14T08:07:38.038470Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10203315950496299810] 2023-09-14T08:07:38.039213Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-09-14T08:07:38.039363Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-09-14T08:07:38.039618Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-09-14T08:07:38.046739Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-09-14T08:07:38.047262Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-09-14T08:07:47.065720Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-09-14T11:30:01.306943Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17202146503397842352] 2023-09-14T11:30:01.307585Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-09-14T11:30:01.314366Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-09-14T11:30:01.314632Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-09-14T11:30:01.314958Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-09-14T11:30:01.315356Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-09-14T11:30:10.335216Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-09-15T08:10:17.451754Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5001598590861026823] 2023-09-15T08:10:17.452524Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-09-15T08:10:17.452665Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-09-15T08:10:17.452935Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-09-15T08:10:17.453324Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-09-15T08:10:17.453707Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-09-15T08:10:26.475898Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-09-16T08:04:39.254100Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2912657626621540292] 2023-09-16T08:04:39.255572Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-09-16T08:04:39.255719Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-09-16T08:04:39.256012Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-09-16T08:04:39.256429Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-09-16T08:04:39.256961Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-09-16T08:04:48.277638Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-09-17T08:03:00.277126Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6848673980873279343] 2023-09-17T08:03:00.278268Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-09-17T08:03:00.278442Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-09-17T08:03:00.278695Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-09-17T08:03:00.279137Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-09-17T08:03:00.279679Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-09-17T08:03:09.300182Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-09-18T08:10:26.044592Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14081428044352984040] 2023-09-18T08:10:26.047110Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-09-18T08:10:26.047283Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-09-18T08:10:26.047556Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-09-18T08:10:26.048008Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-09-18T08:10:26.048568Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-09-18T08:10:35.069840Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-09-19T08:05:14.865706Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10080316637814841452] 2023-09-19T08:05:14.866452Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-09-19T08:05:14.866572Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-09-19T08:05:14.873470Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-09-19T08:05:14.873967Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-09-19T08:05:14.874445Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-09-19T08:05:23.888925Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-09-20T08:02:20.782596Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9631404962524515851] 2023-09-20T08:02:20.783479Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-09-20T08:02:20.783605Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-09-20T08:02:20.783883Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-09-20T08:02:20.784276Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-09-20T08:02:20.784773Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-09-20T08:02:29.806759Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-09-21T08:06:01.401855Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10663455423940951708] 2023-09-21T08:06:01.409325Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-09-21T08:06:01.409466Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-09-21T08:06:01.409708Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-09-21T08:06:01.410071Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-09-21T08:06:01.410538Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-09-21T08:06:10.425567Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-09-22T08:05:31.036326Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6928227505756555040] 2023-09-22T08:05:31.037283Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-09-22T08:05:31.037422Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-09-22T08:05:31.037910Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-09-22T08:05:31.038445Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-09-22T08:05:31.043964Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-09-22T08:05:40.066726Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-09-23T08:01:18.966016Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16906255192708400418] 2023-09-23T08:01:18.967481Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-09-23T08:01:18.967617Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-09-23T08:01:18.967877Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-09-23T08:01:18.968331Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-09-23T08:01:18.968869Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-09-23T08:01:27.989913Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-09-24T08:03:27.050314Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_13912855654227817471] 2023-09-24T08:03:27.057679Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-09-24T08:03:27.057818Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-09-24T08:03:27.058100Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-09-24T08:03:27.058528Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-09-24T08:03:27.059034Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-09-24T08:03:36.074008Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-09-25T08:03:58.878453Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1509631341073560800] 2023-09-25T08:03:58.879063Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-09-25T08:03:58.879181Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-09-25T08:03:58.886154Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-09-25T08:03:58.886677Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-09-25T08:03:58.887167Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-09-25T08:04:07.902123Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-09-26T08:07:13.860346Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6410414514405184499] 2023-09-26T08:07:13.861654Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-09-26T08:07:13.861783Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-09-26T08:07:13.862018Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-09-26T08:07:13.862425Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-09-26T08:07:13.862909Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-09-26T08:07:22.884455Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-09-27T08:05:29.288622Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11673092811640469462] 2023-09-27T08:05:29.289298Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-09-27T08:05:29.289480Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-09-27T08:05:29.289731Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-09-27T08:05:29.290096Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-09-27T08:05:29.290482Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-09-27T08:05:38.312026Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-09-28T08:09:50.809757Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17530060418523136334] 2023-09-28T08:09:50.810423Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-09-28T08:09:50.817216Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-09-28T08:09:50.817503Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-09-28T08:09:50.817864Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-09-28T08:09:50.818319Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-09-28T08:09:59.832324Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-09-29T08:11:10.656314Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10884275710725215169] 2023-09-29T08:11:10.663913Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-09-29T08:11:10.664086Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-09-29T08:11:10.664349Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-09-29T08:11:10.664733Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-09-29T08:11:10.665247Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-09-29T08:11:19.685319Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-09-30T08:08:16.081779Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2087947401295302034] 2023-09-30T08:08:16.083150Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-09-30T08:08:16.083300Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-09-30T08:08:16.083554Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-09-30T08:08:16.083976Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-09-30T08:08:16.084495Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-09-30T08:08:25.103928Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-10-01T08:01:12.950687Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17259050124396185019] 2023-10-01T08:01:12.951508Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-10-01T08:01:12.951651Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-10-01T08:01:12.951901Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-10-01T08:01:12.952275Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-10-01T08:01:12.952680Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-10-01T08:01:21.973907Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-10-02T08:04:48.363288Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_18269804333947641903] 2023-10-02T08:04:48.370655Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-10-02T08:04:48.370809Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-10-02T08:04:48.371076Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-10-02T08:04:48.371490Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-10-02T08:04:48.371967Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-10-02T08:04:57.386693Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-10-03T08:07:42.094746Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10535162218487755715] 2023-10-03T08:07:42.096182Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-10-03T08:07:42.096314Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-10-03T08:07:42.096565Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-10-03T08:07:42.099449Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-10-03T08:07:42.099956Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-10-03T08:07:51.115184Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-10-04T08:09:53.826419Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8424823508573736691] 2023-10-04T08:09:53.833871Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-10-04T08:09:53.834126Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-10-04T08:09:53.834421Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-10-04T08:09:53.834837Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-10-04T08:09:53.835294Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-10-04T08:10:02.854438Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-10-05T08:00:41.902508Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7571302582668160083] 2023-10-05T08:00:41.909976Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-10-05T08:00:41.910145Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-10-05T08:00:41.910435Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-10-05T08:00:41.910793Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-10-05T08:00:41.911307Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-10-05T08:00:50.932954Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-10-06T08:08:32.279694Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_18445333399254096363] 2023-10-06T08:08:32.280512Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-10-06T08:08:32.280639Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-10-06T08:08:32.280888Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-10-06T08:08:32.281256Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-10-06T08:08:32.281754Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-10-06T08:08:41.303688Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-10-07T08:02:07.781952Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16697711180466351084] 2023-10-07T08:02:07.782860Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-10-07T08:02:07.783010Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-10-07T08:02:07.790054Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-10-07T08:02:07.790492Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-10-07T08:02:07.791023Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-10-07T08:02:16.805738Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-10-08T08:04:13.112105Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17519970341349361554] 2023-10-08T08:04:13.113403Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-10-08T08:04:13.113537Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-10-08T08:04:13.113782Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-10-08T08:04:13.120614Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-10-08T08:04:13.121212Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-10-08T08:04:22.136830Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-10-09T08:09:44.279961Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4572496180747111648] 2023-10-09T08:09:44.281313Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-10-09T08:09:44.281457Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-10-09T08:09:44.281717Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-10-09T08:09:44.282183Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-10-09T08:09:44.282731Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-10-09T08:09:53.302339Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-10-10T08:04:30.326295Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_18331969243371260232] 2023-10-10T08:04:30.334645Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-10-10T08:04:30.335185Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-10-10T08:04:30.335981Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-10-10T08:04:30.336743Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-10-10T08:04:30.344168Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-10-10T08:04:39.368344Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-10-11T08:02:08.047251Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_18215931003525887715] 2023-10-11T08:02:08.048032Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-10-11T08:02:08.048173Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-10-11T08:02:08.048435Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-10-11T08:02:08.055220Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-10-11T08:02:08.055902Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-10-11T08:02:17.070957Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-10-12T08:02:26.271659Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1506026004338947340] 2023-10-12T08:02:26.279205Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-10-12T08:02:26.279387Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-10-12T08:02:26.279667Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-10-12T08:02:26.280079Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-10-12T08:02:26.280516Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-10-12T08:02:35.307576Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-10-13T08:04:09.856731Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9733130403515400382] 2023-10-13T08:04:09.857545Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-10-13T08:04:09.857687Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-10-13T08:04:09.857958Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-10-13T08:04:09.865128Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-10-13T08:04:09.865847Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-10-13T08:04:18.881188Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-10-14T08:04:12.713452Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4224008709009951372] 2023-10-14T08:04:12.714819Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-10-14T08:04:12.714957Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-10-14T08:04:12.715201Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-10-14T08:04:12.715625Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-10-14T08:04:12.716121Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-10-14T08:04:21.734504Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-10-15T08:04:08.434757Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16707583054324308591] 2023-10-15T08:04:08.436183Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-10-15T08:04:08.436327Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-10-15T08:04:08.436584Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-10-15T08:04:08.437205Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-10-15T08:04:08.437836Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-10-15T08:04:17.455460Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-10-16T08:08:42.375597Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5043160072179384805] 2023-10-16T08:08:42.376515Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-10-16T08:08:42.376642Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-10-16T08:08:42.376906Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-10-16T08:08:42.377249Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-10-16T08:08:42.377737Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-10-16T08:08:51.400366Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-10-17T08:03:22.861495Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4523814183173285101] 2023-10-17T08:03:22.869085Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-10-17T08:03:22.869263Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-10-17T08:03:22.869564Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-10-17T08:03:22.869947Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-10-17T08:03:22.870503Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-10-17T08:03:31.888849Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-10-18T08:09:50.069965Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3614748754416449615] 2023-10-18T08:09:50.070804Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-10-18T08:09:50.070957Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-10-18T08:09:50.071219Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-10-18T08:09:50.071594Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-10-18T08:09:50.072117Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-10-18T08:09:59.094015Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-10-19T08:06:31.771379Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17743509080634479681] 2023-10-19T08:06:31.772373Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-10-19T08:06:31.772534Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-10-19T08:06:31.772862Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-10-19T08:06:31.773351Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-10-19T08:06:31.773779Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-10-19T08:06:40.793226Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-10-20T09:03:15.756932Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11721392465887263395] 2023-10-20T09:03:15.764525Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-10-20T09:03:15.764695Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-10-20T09:03:15.764967Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-10-20T09:03:15.765328Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-10-20T09:03:15.765742Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-10-20T09:03:24.789667Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-10-21T02:08:50.939907Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11721392465887263395] 2023-10-21T02:08:50.947503Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-10-21T02:08:50.947662Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-10-21T02:08:50.947905Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-10-21T02:08:50.948455Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-10-21T02:08:50.948850Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-10-21T02:08:59.972548Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-10-21T08:03:04.907101Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11090535797230981943] 2023-10-21T08:03:04.907914Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-10-21T08:03:04.908036Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-10-21T08:03:04.908341Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-10-21T08:03:04.908727Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-10-21T08:03:04.915807Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-10-21T08:03:13.929935Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-10-22T08:03:11.820554Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_643870119506090825] 2023-10-22T08:03:11.828078Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-10-22T08:03:11.828217Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-10-22T08:03:11.828508Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-10-22T08:03:11.828964Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-10-22T08:03:11.829532Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-10-22T08:03:20.850242Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-10-23T08:07:22.617340Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9782145518500754157] 2023-10-23T08:07:22.618136Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-10-23T08:07:22.618263Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-10-23T08:07:22.618559Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-10-23T08:07:22.625694Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-10-23T08:07:22.626330Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-10-23T08:07:31.642216Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-10-24T08:01:28.124912Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11997766635151129223] 2023-10-24T08:01:28.125818Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-10-24T08:01:28.125962Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-10-24T08:01:28.126253Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-10-24T08:01:28.126795Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-10-24T08:01:28.134163Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-10-24T08:01:37.154635Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-10-25T08:02:14.341385Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10439399581981982156] 2023-10-25T08:02:14.342212Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-10-25T08:02:14.348861Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-10-25T08:02:14.349328Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-10-25T08:02:14.349745Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-10-25T08:02:14.350285Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-10-25T08:02:23.373347Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-10-26T08:01:28.997032Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_477684587547789131] 2023-10-26T08:01:28.997832Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-10-26T08:01:28.997954Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-10-26T08:01:29.004383Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-10-26T08:01:29.004966Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-10-26T08:01:29.005782Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-10-26T08:01:38.026013Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-10-27T08:04:53.802325Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11098123502642098594] 2023-10-27T08:04:53.803173Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-10-27T08:04:53.803296Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-10-27T08:04:53.803551Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-10-27T08:04:53.803924Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-10-27T08:04:53.804430Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-10-27T08:05:02.831042Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-10-28T08:04:34.538898Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9797386245494491365] 2023-10-28T08:04:34.539863Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-10-28T08:04:34.539993Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-10-28T08:04:34.540390Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-10-28T08:04:34.541012Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-10-28T08:04:34.541707Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-10-28T08:04:43.562817Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-10-29T08:04:03.512723Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_13644732752290068401] 2023-10-29T08:04:03.519906Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-10-29T08:04:03.520074Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-10-29T08:04:03.520341Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-10-29T08:04:03.520692Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-10-29T08:04:03.521249Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-10-29T08:04:12.541563Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-10-30T08:01:55.969173Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12159299613395353590] 2023-10-30T08:01:55.969991Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-10-30T08:01:55.970111Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-10-30T08:01:55.970384Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-10-30T08:01:55.970758Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-10-30T08:01:55.971290Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-10-30T08:02:04.991905Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-10-31T08:04:44.028576Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_924167793428982814] 2023-10-31T08:04:44.035848Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-10-31T08:04:44.035980Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-10-31T08:04:44.036227Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-10-31T08:04:44.036577Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-10-31T08:04:44.037128Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-10-31T08:04:53.063026Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-11-01T08:05:54.000422Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3184301787445686046] 2023-11-01T08:05:54.001200Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-11-01T08:05:54.001339Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-11-01T08:05:54.008201Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-11-01T08:05:54.008642Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-11-01T08:05:54.009268Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-11-01T08:06:03.027967Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-11-02T08:10:04.763312Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8514575197418026740] 2023-11-02T08:10:04.764126Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-11-02T08:10:04.764337Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-11-02T08:10:04.764608Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-11-02T08:10:04.764960Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-11-02T08:10:04.765459Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-11-02T08:10:13.787271Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-11-03T08:06:52.720136Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8892357645284375643] 2023-11-03T08:06:52.720914Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-11-03T08:06:52.721055Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-11-03T08:06:52.721320Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-11-03T08:06:52.721682Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-11-03T08:06:52.722070Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-11-03T08:07:01.743621Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-11-04T08:10:23.139355Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3212661433071341164] 2023-11-04T08:10:23.140048Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-11-04T08:10:23.140178Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-11-04T08:10:23.147004Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-11-04T08:10:23.147469Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-11-04T08:10:23.147958Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-11-04T08:10:32.163403Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-11-05T08:05:40.718151Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4115488558355093597] 2023-11-05T08:05:40.719594Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-11-05T08:05:40.719746Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-11-05T08:05:40.720053Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-11-05T08:05:40.720506Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-11-05T08:05:40.720960Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-11-05T08:05:49.740024Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-11-06T08:03:24.018353Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10888064478526653241] 2023-11-06T08:03:24.025617Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-11-06T08:03:24.025772Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-11-06T08:03:24.026031Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-11-06T08:03:24.026442Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-11-06T08:03:24.026940Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-11-06T08:03:33.045936Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-11-07T08:07:23.382682Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9694852859375152715] 2023-11-07T08:07:23.389881Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-11-07T08:07:23.390046Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-11-07T08:07:23.390332Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-11-07T08:07:23.390730Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-11-07T08:07:23.391285Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-11-07T08:07:32.412945Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-11-08T08:02:36.094738Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9804798358585965563] 2023-11-08T08:02:36.095721Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-11-08T08:02:36.095843Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-11-08T08:02:36.096183Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-11-08T08:02:36.096843Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-11-08T08:02:36.097552Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-11-08T08:02:45.119013Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-11-09T08:05:57.696713Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6754432811962432402] 2023-11-09T08:05:57.697523Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-11-09T08:05:57.697641Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-11-09T08:05:57.697890Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-11-09T08:05:57.698265Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-11-09T08:05:57.698750Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-11-09T08:06:06.720767Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-11-10T08:03:52.870743Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5641050672337335997] 2023-11-10T08:03:52.871528Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-11-10T08:03:52.871654Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-11-10T08:03:52.871932Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-11-10T08:03:52.878929Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-11-10T08:03:52.879540Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-11-10T08:04:01.898186Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-11-11T08:03:35.739952Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14003978457936016889] 2023-11-11T08:03:35.747664Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-11-11T08:03:35.747870Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-11-11T08:03:35.748128Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-11-11T08:03:35.748495Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-11-11T08:03:35.749008Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-11-11T08:03:44.768124Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-11-12T08:10:40.845050Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6623970599647905855] 2023-11-12T08:10:40.852269Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-11-12T08:10:40.852404Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-11-12T08:10:40.852692Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-11-12T08:10:40.853066Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-11-12T08:10:40.853589Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-11-12T08:10:49.880958Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-11-13T08:06:56.282746Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2751609872409586713] 2023-11-13T08:06:56.294476Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-11-13T08:06:56.294630Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-11-13T08:06:56.294879Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-11-13T08:06:56.295590Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-11-13T08:06:56.296262Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-11-13T08:07:05.314811Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-11-14T08:07:38.206425Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15599163903154224602] 2023-11-14T08:07:38.214014Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-11-14T08:07:38.214165Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-11-14T08:07:38.214437Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-11-14T08:07:38.214814Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-11-14T08:07:38.215262Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-11-14T08:07:47.234644Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-11-15T08:04:31.272023Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6493736374323751511] 2023-11-15T08:04:31.272748Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-11-15T08:04:31.278837Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-11-15T08:04:31.279252Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-11-15T08:04:31.279667Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-11-15T08:04:31.280173Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-11-15T08:04:40.298361Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-11-16T08:10:03.707297Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5987572067661592534] 2023-11-16T08:10:03.708125Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-11-16T08:10:03.708260Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-11-16T08:10:03.708517Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-11-16T08:10:03.709210Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-11-16T08:10:03.709802Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-11-16T08:10:12.728174Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-11-17T02:08:26.785947Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5987572067661592534] 2023-11-17T02:08:26.793313Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-11-17T02:08:26.793461Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-11-17T02:08:26.793711Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-11-17T02:08:26.794604Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-11-17T02:08:26.795111Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-11-17T02:08:35.818455Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-11-17T08:07:17.199022Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3156813821815794703] 2023-11-17T08:07:17.199766Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-11-17T08:07:17.206287Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-11-17T08:07:17.206608Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-11-17T08:07:17.207036Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-11-17T08:07:17.207598Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-11-17T08:07:26.225784Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-11-18T08:03:33.931327Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5767643752677393652] 2023-11-18T08:03:33.932759Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-11-18T08:03:33.932913Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-11-18T08:03:33.933195Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-11-18T08:03:33.933766Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-11-18T08:03:33.934332Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-11-18T08:03:42.950579Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-11-19T08:08:35.029817Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10117171362009767429] 2023-11-19T08:08:35.030883Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-11-19T08:08:35.031011Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-11-19T08:08:35.031255Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-11-19T08:08:35.031685Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-11-19T08:08:35.032247Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-11-19T08:08:44.053262Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-11-20T08:06:06.516551Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11105056698915276257] 2023-11-20T08:06:06.524092Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-11-20T08:06:06.524238Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-11-20T08:06:06.524503Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-11-20T08:06:06.524902Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-11-20T08:06:06.525463Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-11-20T08:06:15.545288Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-11-21T08:02:18.602587Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3890251630857465933] 2023-11-21T08:02:18.609959Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-11-21T08:02:18.610285Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-11-21T08:02:18.610592Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-11-21T08:02:18.611065Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-11-21T08:02:18.611609Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-11-21T08:02:27.626197Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-11-22T08:07:28.184875Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5053778393068889054] 2023-11-22T08:07:28.185742Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-11-22T08:07:28.185865Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-11-22T08:07:28.186116Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-11-22T08:07:28.186495Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-11-22T08:07:28.186908Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-11-22T08:07:37.207739Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-11-23T08:03:45.712077Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11859536293962019742] 2023-11-23T08:03:45.712883Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-11-23T08:03:45.713017Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-11-23T08:03:45.713276Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-11-23T08:03:45.713665Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-11-23T08:03:45.714134Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-11-23T08:03:54.738394Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-11-24T08:10:35.248836Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14626164369350750867] 2023-11-24T08:10:35.249618Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-11-24T08:10:35.249741Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-11-24T08:10:35.249986Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-11-24T08:10:35.250352Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-11-24T08:10:35.250845Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-11-24T08:10:44.272446Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-11-25T08:02:01.212669Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4896459319936724362] 2023-11-25T08:02:01.214272Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-11-25T08:02:01.214422Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-11-25T08:02:01.214689Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-11-25T08:02:01.215164Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-11-25T08:02:01.215800Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-11-25T08:02:10.237320Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-11-26T08:05:01.504230Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4378222167063397711] 2023-11-26T08:05:01.505022Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-11-26T08:05:01.505193Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-11-26T08:05:01.505461Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-11-26T08:05:01.505834Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-11-26T08:05:01.512988Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-11-26T08:05:10.532830Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-11-27T08:05:06.700959Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_13896453781811629153] 2023-11-27T08:05:06.702017Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-11-27T08:05:06.702149Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-11-27T08:05:06.702414Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-11-27T08:05:06.702765Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-11-27T08:05:06.703235Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-11-27T08:05:15.725338Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-11-28T08:05:12.092124Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5704651606840698507] 2023-11-28T08:05:12.092905Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-11-28T08:05:12.093030Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-11-28T08:05:12.093288Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-11-28T08:05:12.093637Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-11-28T08:05:12.094160Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-11-28T08:05:21.116748Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-11-29T08:01:36.353917Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_456961455360229655] 2023-11-29T08:01:36.361414Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-11-29T08:01:36.361574Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-11-29T08:01:36.361862Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-11-29T08:01:36.362239Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-11-29T08:01:36.362858Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-11-29T08:01:45.382048Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-11-30T08:04:23.759152Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4255177291524618283] 2023-11-30T08:04:23.760056Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-11-30T08:04:23.760180Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-11-30T08:04:23.760438Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-11-30T08:04:23.760830Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-11-30T08:04:23.761258Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-11-30T08:04:32.781704Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-12-01T08:04:58.656489Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9125418334509467734] 2023-12-01T08:04:58.657338Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-12-01T08:04:58.657468Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-12-01T08:04:58.657731Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-12-01T08:04:58.658078Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-12-01T08:04:58.665463Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-12-01T08:05:07.685587Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-12-02T08:10:23.238184Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_278625886223906059] 2023-12-02T08:10:23.238986Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-12-02T08:10:23.239130Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-12-02T08:10:23.239370Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-12-02T08:10:23.239749Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-12-02T08:10:23.240243Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-12-02T08:10:32.266690Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-12-03T08:02:43.450000Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6509110841764152314] 2023-12-03T08:02:43.457587Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-12-03T08:02:43.457723Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-12-03T08:02:43.457963Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-12-03T08:02:43.458415Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-12-03T08:02:43.458882Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-12-03T08:02:52.478061Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-12-04T08:05:17.314204Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11146054032428922594] 2023-12-04T08:05:17.314896Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-12-04T08:05:17.321693Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-12-04T08:05:17.321982Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-12-04T08:05:17.322369Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-12-04T08:05:17.322896Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-12-04T08:05:26.343528Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-12-05T08:04:36.975641Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8090268826025387078] 2023-12-05T08:04:36.977026Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-12-05T08:04:36.977174Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-12-05T08:04:36.977442Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-12-05T08:04:36.977943Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-12-05T08:04:36.978486Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-12-05T08:04:45.999836Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-12-06T08:02:32.966477Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10331047012966070299] 2023-12-06T08:02:32.967298Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-12-06T08:02:32.967423Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-12-06T08:02:32.967691Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-12-06T08:02:32.968081Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-12-06T08:02:32.975273Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-12-06T08:02:41.992855Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-12-07T08:09:55.302340Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9752177853699720505] 2023-12-07T08:09:55.303140Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-12-07T08:09:55.303261Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-12-07T08:09:55.303530Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-12-07T08:09:55.303919Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-12-07T08:09:55.304429Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-12-07T08:10:04.326256Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-12-08T08:04:21.065965Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9747993954434966109] 2023-12-08T08:04:21.066796Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-12-08T08:04:21.066919Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-12-08T08:04:21.067197Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-12-08T08:04:21.067615Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-12-08T08:04:21.068075Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-12-08T08:04:30.089041Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-12-09T08:06:00.618820Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7163108682556786155] 2023-12-09T08:06:00.620324Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-12-09T08:06:00.620470Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-12-09T08:06:00.620737Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-12-09T08:06:00.621181Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-12-09T08:06:00.621795Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-12-09T08:06:09.643653Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-12-10T02:07:42.882295Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7163108682556786155] 2023-12-10T02:07:42.889658Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-12-10T02:07:42.889878Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-12-10T02:07:42.890188Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-12-10T02:07:42.890735Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-12-10T02:07:42.891221Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-12-10T02:07:51.906421Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-12-10T08:09:56.007652Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2599262298023082101] 2023-12-10T08:09:56.008301Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-12-10T08:09:56.015035Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-12-10T08:09:56.015307Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-12-10T08:09:56.015658Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-12-10T08:09:56.016205Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-12-10T08:10:05.038203Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-12-11T08:07:24.086846Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4716266785351737403] 2023-12-11T08:07:24.088264Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-12-11T08:07:24.088438Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-12-11T08:07:24.088721Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-12-11T08:07:24.089173Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-12-11T08:07:24.089720Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-12-11T08:07:33.111052Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-12-12T08:08:25.185427Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2045984467503090296] 2023-12-12T08:08:25.192979Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-12-12T08:08:25.193184Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-12-12T08:08:25.193466Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-12-12T08:08:25.193824Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-12-12T08:08:25.194356Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-12-12T08:08:34.213444Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-12-13T08:04:27.003744Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15021990070077102666] 2023-12-13T08:04:27.004502Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-12-13T08:04:27.004623Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-12-13T08:04:27.004907Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-12-13T08:04:27.012036Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-12-13T08:04:27.012624Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-12-13T08:04:36.027512Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-12-14T08:02:34.221439Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7152669189784723137] 2023-12-14T08:02:34.222882Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-12-14T08:02:34.223015Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-12-14T08:02:34.223290Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-12-14T08:02:34.223782Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-12-14T08:02:34.224224Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-12-14T08:02:43.245857Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-12-15T08:00:46.261602Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15177002644299409402] 2023-12-15T08:00:46.262892Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-12-15T08:00:46.263027Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-12-15T08:00:46.263281Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-12-15T08:00:46.263696Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-12-15T08:00:46.264154Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-12-15T08:00:55.279423Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-12-16T08:05:32.774655Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_18068999406345002405] 2023-12-16T08:05:32.782101Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-12-16T08:05:32.782287Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-12-16T08:05:32.782561Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-12-16T08:05:32.782932Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-12-16T08:05:32.783410Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-12-16T08:05:41.803002Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-12-17T08:04:33.961658Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_232966209696696747] 2023-12-17T08:04:33.962863Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-12-17T08:04:33.962990Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-12-17T08:04:33.963231Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-12-17T08:04:33.963677Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-12-17T08:04:33.964049Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-12-17T08:04:42.983045Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-12-18T08:07:12.659294Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_13121553117476984427] 2023-12-18T08:07:12.660118Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-12-18T08:07:12.660244Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-12-18T08:07:12.667094Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-12-18T08:07:12.667561Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-12-18T08:07:12.667930Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-12-18T08:07:21.688869Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-12-19T08:05:40.451654Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10398151080920091393] 2023-12-19T08:05:40.452387Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-12-19T08:05:40.452504Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-12-19T08:05:40.452750Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-12-19T08:05:40.460031Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-12-19T08:05:40.460559Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-12-19T08:05:49.480367Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-12-20T08:05:19.261504Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2911091636857458531] 2023-12-20T08:05:19.262171Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-12-20T08:05:19.262279Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-12-20T08:05:19.262565Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-12-20T08:05:19.262925Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-12-20T08:05:19.270118Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-12-20T08:05:28.285598Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-12-21T08:07:58.486949Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_13419597479477276278] 2023-12-21T08:07:58.487743Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-12-21T08:07:58.487851Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-12-21T08:07:58.488101Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-12-21T08:07:58.488562Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-12-21T08:07:58.488968Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-12-21T08:08:07.520799Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-12-22T08:09:25.913928Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6256935714994899157] 2023-12-22T08:09:25.921514Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-12-22T08:09:25.921654Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-12-22T08:09:25.921962Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-12-22T08:09:25.922373Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-12-22T08:09:25.922837Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-12-22T08:09:34.944600Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-12-23T08:08:27.089474Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4216507039502273978] 2023-12-23T08:08:27.090596Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-12-23T08:08:27.090720Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-12-23T08:08:27.090976Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-12-23T08:08:27.091408Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-12-23T08:08:27.091887Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-12-23T08:08:36.113106Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-12-24T08:02:19.018383Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15827277550779008072] 2023-12-24T08:02:19.019098Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-12-24T08:02:19.019215Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-12-24T08:02:19.019472Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-12-24T08:02:19.026556Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-12-24T08:02:19.026985Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-12-24T08:02:28.042112Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-12-25T08:02:44.242065Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6227331712946891074] 2023-12-25T08:02:44.249494Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-12-25T08:02:44.249625Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-12-25T08:02:44.249874Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-12-25T08:02:44.250219Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-12-25T08:02:44.250587Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-12-25T08:02:53.265571Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-12-26T08:07:49.643744Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17210175152587502883] 2023-12-26T08:07:49.644447Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-12-26T08:07:49.644545Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-12-26T08:07:49.644828Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-12-26T08:07:49.645167Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-12-26T08:07:49.645611Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-12-26T08:07:58.667764Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-12-27T08:00:51.155259Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12763066980732418835] 2023-12-27T08:00:51.156109Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-12-27T08:00:51.156247Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-12-27T08:00:51.156533Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-12-27T08:00:51.156916Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-12-27T08:00:51.157395Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-12-27T08:01:00.183536Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-12-28T08:03:48.321002Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1355459073831904234] 2023-12-28T08:03:48.321759Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-12-28T08:03:48.321868Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-12-28T08:03:48.322164Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-12-28T08:03:48.322534Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-12-28T08:03:48.329570Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-12-28T08:03:57.345534Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-12-29T08:02:00.569417Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3592784378075411806] 2023-12-29T08:02:00.576979Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-12-29T08:02:00.577137Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-12-29T08:02:00.577406Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-12-29T08:02:00.577828Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-12-29T08:02:00.578221Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-12-29T08:02:09.597900Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-12-30T08:03:15.812573Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7030599517806357659] 2023-12-30T08:03:15.813443Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-12-30T08:03:15.813558Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-12-30T08:03:15.813866Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-12-30T08:03:15.814246Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-12-30T08:03:15.814701Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-12-30T08:03:24.839978Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2023-12-31T08:03:29.456422Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16285693861821804868] 2023-12-31T08:03:29.457781Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2023-12-31T08:03:29.457893Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2023-12-31T08:03:29.464372Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2023-12-31T08:03:29.464798Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2023-12-31T08:03:29.465278Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2023-12-31T08:03:38.484244Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-01-01T08:06:53.723496Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_18025470162984809372] 2024-01-01T08:06:53.724968Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-01-01T08:06:53.725101Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-01-01T08:06:53.725375Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-01-01T08:06:53.725779Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-01-01T08:06:53.726202Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-01-01T08:07:02.743371Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-01-02T08:08:48.895722Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7926402225870393083] 2024-01-02T08:08:48.896685Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-01-02T08:08:48.896812Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-01-02T08:08:48.897076Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-01-02T08:08:48.897476Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-01-02T08:08:48.904751Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-01-02T08:08:57.921077Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-01-03T08:10:17.352306Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1213552933299668307] 2024-01-03T08:10:17.353154Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-01-03T08:10:17.353278Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-01-03T08:10:17.353585Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-01-03T08:10:17.353972Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-01-03T08:10:17.354551Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-01-03T08:10:26.378868Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-01-04T08:08:51.248546Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14735172832172686250] 2024-01-04T08:08:51.249346Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-01-04T08:08:51.249533Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-01-04T08:08:51.249806Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-01-04T08:08:51.250177Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-01-04T08:08:51.250670Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-01-04T08:09:00.272222Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-01-05T08:09:04.953157Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17977514065312700935] 2024-01-05T08:09:04.953914Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-01-05T08:09:04.954033Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-01-05T08:09:04.954326Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-01-05T08:09:04.954716Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-01-05T08:09:04.961616Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-01-05T08:09:13.996347Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-01-06T08:04:12.893359Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17563570484412333961] 2024-01-06T08:04:12.894709Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-01-06T08:04:12.894832Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-01-06T08:04:12.895089Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-01-06T08:04:12.895482Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-01-06T08:04:12.895968Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-01-06T08:04:21.918080Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-01-07T08:04:12.344902Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10464651786182721327] 2024-01-07T08:04:12.346333Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-01-07T08:04:12.346473Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-01-07T08:04:12.346751Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-01-07T08:04:12.347202Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-01-07T08:04:12.347754Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-01-07T08:04:21.370149Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-01-08T08:07:53.614298Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4199624861631580526] 2024-01-08T08:07:53.615210Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-01-08T08:07:53.615323Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-01-08T08:07:53.615624Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-01-08T08:07:53.616004Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-01-08T08:07:53.616540Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-01-08T08:08:02.637916Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-01-09T08:08:21.036968Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2867271801430912687] 2024-01-09T08:08:21.037744Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-01-09T08:08:21.037876Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-01-09T08:08:21.038158Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-01-09T08:08:21.038543Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-01-09T08:08:21.045988Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-01-09T08:08:30.061496Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-01-10T08:07:19.733757Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12939914938807536283] 2024-01-10T08:07:19.735006Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-01-10T08:07:19.735116Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-01-10T08:07:19.735355Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-01-10T08:07:19.742293Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-01-10T08:07:19.742885Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-01-10T08:07:28.758590Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-01-11T08:09:01.719661Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7239890487918917952] 2024-01-11T08:09:01.720466Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-01-11T08:09:01.720592Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-01-11T08:09:01.720874Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-01-11T08:09:01.727820Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-01-11T08:09:01.728449Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-01-11T08:09:10.742202Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-01-12T08:06:12.613458Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14679662615582583423] 2024-01-12T08:06:12.614250Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-01-12T08:06:12.614397Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-01-12T08:06:12.614672Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-01-12T08:06:12.615047Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-01-12T08:06:12.622114Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-01-12T08:06:21.637529Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-01-13T08:08:01.435252Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10789875764173757408] 2024-01-13T08:08:01.436062Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-01-13T08:08:01.436186Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-01-13T08:08:01.436448Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-01-13T08:08:01.436864Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-01-13T08:08:01.437324Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-01-13T08:08:10.459799Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-01-14T08:07:45.698326Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14610783565782037653] 2024-01-14T08:07:45.705790Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-01-14T08:07:45.705897Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-01-14T08:07:45.706167Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-01-14T08:07:45.706526Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-01-14T08:07:45.706963Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-01-14T08:07:54.729146Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-01-15T08:02:04.966832Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6740013511631801122] 2024-01-15T08:02:04.967648Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-01-15T08:02:04.967756Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-01-15T08:02:04.968048Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-01-15T08:02:04.968407Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-01-15T08:02:04.975898Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-01-15T08:02:13.991428Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-01-16T08:03:41.211034Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16561063972230055615] 2024-01-16T08:03:41.218252Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-01-16T08:03:41.218386Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-01-16T08:03:41.218638Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-01-16T08:03:41.219067Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-01-16T08:03:41.219437Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-01-16T08:03:50.238112Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-01-17T08:03:16.423458Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17363565663409578227] 2024-01-17T08:03:16.424285Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-01-17T08:03:16.424406Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-01-17T08:03:16.424671Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-01-17T08:03:16.425068Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-01-17T08:03:16.425482Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-01-17T08:03:25.446838Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-01-18T08:07:21.381808Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15680036995077782073] 2024-01-18T08:07:21.382686Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-01-18T08:07:21.382817Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-01-18T08:07:21.383090Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-01-18T08:07:21.389823Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-01-18T08:07:21.390373Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-01-18T08:07:30.409286Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-01-19T08:10:01.494553Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12391951154020691694] 2024-01-19T08:10:01.504388Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-01-19T08:10:01.504528Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-01-19T08:10:01.506580Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-01-19T08:10:01.507028Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-01-19T08:10:01.514172Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-01-19T08:10:10.566573Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-01-20T08:08:18.532709Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17372627743107236970] 2024-01-20T08:08:18.540313Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-01-20T08:08:18.540460Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-01-20T08:08:18.540721Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-01-20T08:08:18.541121Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-01-20T08:08:18.541575Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-01-20T08:08:27.560431Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-01-21T08:19:12.596679Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14044032351895067229] 2024-01-21T08:19:12.604021Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-01-21T08:19:12.604246Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-01-21T08:19:12.604538Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-01-21T08:19:12.604921Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-01-21T08:19:12.605449Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-01-21T08:19:21.630987Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-01-22T08:04:33.589196Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_18230827418045528473] 2024-01-22T08:04:33.589944Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-01-22T08:04:33.590051Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-01-22T08:04:33.590297Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-01-22T08:04:33.597477Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-01-22T08:04:33.598002Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-01-22T08:04:42.620922Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-01-23T08:07:22.942398Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_13981281222292117213] 2024-01-23T08:07:22.943176Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-01-23T08:07:22.943298Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-01-23T08:07:22.943558Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-01-23T08:07:22.943938Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-01-23T08:07:22.944333Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-01-23T08:07:31.965924Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-01-24T08:01:57.095368Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9676404510375070904] 2024-01-24T08:01:57.102890Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-01-24T08:01:57.103020Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-01-24T08:01:57.103286Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-01-24T08:01:57.103710Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-01-24T08:01:57.104120Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-01-24T08:02:06.127049Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-01-25T08:01:59.650210Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5143943507121812120] 2024-01-25T08:01:59.652582Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-01-25T08:01:59.652708Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-01-25T08:01:59.652968Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-01-25T08:01:59.653432Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-01-25T08:01:59.653916Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-01-25T08:02:08.671308Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-01-26T08:07:42.375981Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4422708585181547238] 2024-01-26T08:07:42.376731Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-01-26T08:07:42.376851Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-01-26T08:07:42.377119Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-01-26T08:07:42.377502Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-01-26T08:07:42.378007Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-01-26T08:07:51.398666Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-01-27T08:07:42.477572Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2292191669878409788] 2024-01-27T08:07:42.485101Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-01-27T08:07:42.485254Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-01-27T08:07:42.485520Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-01-27T08:07:42.485920Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-01-27T08:07:42.486474Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-01-27T08:07:51.509837Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-01-28T02:08:06.759469Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2292191669878409788] 2024-01-28T02:08:06.767377Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-01-28T02:08:06.767497Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-01-28T02:08:06.767768Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-01-28T02:08:06.768256Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-01-28T02:08:06.768653Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-01-28T02:08:15.789906Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-01-28T08:09:25.740530Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12884451469238552149] 2024-01-28T08:09:25.741206Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-01-28T08:09:25.748046Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-01-28T08:09:25.748394Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-01-28T08:09:25.748800Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-01-28T08:09:25.749328Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-01-28T08:09:34.764353Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-01-29T08:08:46.702195Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_13697470394213997490] 2024-01-29T08:08:46.702962Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-01-29T08:08:46.703080Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-01-29T08:08:46.703339Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-01-29T08:08:46.703703Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-01-29T08:08:46.704173Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-01-29T08:08:55.725142Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-01-30T08:05:57.548229Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9870702595110991950] 2024-01-30T08:05:57.549168Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-01-30T08:05:57.549304Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-01-30T08:05:57.556229Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-01-30T08:05:57.556788Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-01-30T08:05:57.557242Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-01-30T08:06:06.572421Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-01-31T08:08:47.014192Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15895527550879848593] 2024-01-31T08:08:47.015774Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-01-31T08:08:47.015907Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-01-31T08:08:47.016181Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-01-31T08:08:47.016628Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-01-31T08:08:47.017161Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-01-31T08:08:56.038741Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-02-01T08:06:24.844772Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8018980033077971573] 2024-02-01T08:06:24.845659Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-02-01T08:06:24.845783Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-02-01T08:06:24.846061Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-02-01T08:06:24.846411Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-02-01T08:06:24.846810Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-02-01T08:06:33.871912Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-02-02T08:08:14.286355Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15882326226961213666] 2024-02-02T08:08:14.293836Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-02-02T08:08:14.294011Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-02-02T08:08:14.294285Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-02-02T08:08:14.294665Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-02-02T08:08:14.295130Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-02-02T08:08:23.317568Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-02-03T08:06:09.129849Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3332593549730404390] 2024-02-03T08:06:09.131267Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-02-03T08:06:09.131383Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-02-03T08:06:09.131620Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-02-03T08:06:09.132027Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-02-03T08:06:09.132423Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-02-03T08:06:18.150514Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-02-04T08:02:47.994864Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7108701200151337317] 2024-02-04T08:02:47.995569Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-02-04T08:02:48.002326Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-02-04T08:02:48.002714Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-02-04T08:02:48.003090Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-02-04T08:02:48.003497Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-02-04T08:02:57.023027Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-02-05T08:07:01.291342Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1523241743192120408] 2024-02-05T08:07:01.292753Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-02-05T08:07:01.292887Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-02-05T08:07:01.293140Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-02-05T08:07:01.293567Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-02-05T08:07:01.293957Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-02-05T08:07:10.312176Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-02-06T08:05:18.756205Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7056587864853213121] 2024-02-06T08:05:18.758065Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-02-06T08:05:18.758193Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-02-06T08:05:18.758463Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-02-06T08:05:18.758860Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-02-06T08:05:18.759230Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-02-06T08:05:27.776055Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-02-07T08:03:15.390043Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14337895809966246216] 2024-02-07T08:03:15.397544Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-02-07T08:03:15.397693Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-02-07T08:03:15.397955Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-02-07T08:03:15.398306Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-02-07T08:03:15.398706Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-02-07T08:03:24.418281Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-02-08T08:07:16.665915Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8654077131706808118] 2024-02-08T08:07:16.666890Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-02-08T08:07:16.667066Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-02-08T08:07:16.667353Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-02-08T08:07:16.667782Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-02-08T08:07:16.668312Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-02-08T08:07:25.695377Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-02-09T08:02:43.452317Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15885526458350113617] 2024-02-09T08:02:43.453902Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-02-09T08:02:43.454055Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-02-09T08:02:43.454309Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-02-09T08:02:43.454691Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-02-09T08:02:43.455221Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-02-09T08:02:52.474121Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-02-10T08:02:48.178347Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9902161589528158650] 2024-02-10T08:02:48.185812Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-02-10T08:02:48.185992Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-02-10T08:02:48.186252Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-02-10T08:02:48.186603Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-02-10T08:02:48.187071Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-02-10T08:02:57.206354Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-02-11T08:02:02.942242Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1549300127662751352] 2024-02-11T08:02:02.943647Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-02-11T08:02:02.943952Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-02-11T08:02:02.944382Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-02-11T08:02:02.944863Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-02-11T08:02:02.945355Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-02-11T08:02:11.963727Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-02-12T08:09:40.802343Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_642307356834306521] 2024-02-12T08:09:40.809858Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-02-12T08:09:40.810202Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-02-12T08:09:40.810528Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-02-12T08:09:40.810968Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-02-12T08:09:40.811472Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-02-12T08:09:49.837955Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-02-13T08:09:12.306646Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10559384773060212975] 2024-02-13T08:09:12.307452Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-02-13T08:09:12.307599Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-02-13T08:09:12.307871Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-02-13T08:09:12.308254Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-02-13T08:09:12.315698Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-02-13T08:09:21.330121Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-02-14T08:03:22.182157Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12208410940449795661] 2024-02-14T08:03:22.183084Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-02-14T08:03:22.183222Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-02-14T08:03:22.183567Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-02-14T08:03:22.190988Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-02-14T08:03:22.191535Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-02-14T08:03:31.210964Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-02-15T08:07:14.811246Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_960432515135166571] 2024-02-15T08:07:14.811995Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-02-15T08:07:14.812115Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-02-15T08:07:14.812365Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-02-15T08:07:14.819564Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-02-15T08:07:14.820089Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-02-15T08:07:23.839154Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-02-16T08:08:03.863785Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14323640648698588961] 2024-02-16T08:08:03.864561Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-02-16T08:08:03.864689Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-02-16T08:08:03.864939Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-02-16T08:08:03.865308Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-02-16T08:08:03.872481Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-02-16T08:08:12.888263Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-02-17T08:08:37.221932Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16472681141794234923] 2024-02-17T08:08:37.223338Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-02-17T08:08:37.223471Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-02-17T08:08:37.223760Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-02-17T08:08:37.224213Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-02-17T08:08:37.224729Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-02-17T08:08:46.251424Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-02-18T08:09:42.542506Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14144827033690206633] 2024-02-18T08:09:42.549909Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-02-18T08:09:42.550041Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-02-18T08:09:42.550271Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-02-18T08:09:42.550667Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-02-18T08:09:42.551085Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-02-18T08:09:51.571034Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-02-19T08:05:23.971032Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11889758559792261656] 2024-02-19T08:05:23.971782Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-02-19T08:05:23.971921Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-02-19T08:05:23.972184Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-02-19T08:05:23.972557Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-02-19T08:05:23.973048Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-02-19T08:05:32.996236Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-02-20T08:09:52.326677Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2599906913968333437] 2024-02-20T08:09:52.327394Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-02-20T08:09:52.334091Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-02-20T08:09:52.334450Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-02-20T08:09:52.334958Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-02-20T08:09:52.335428Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-02-20T08:10:01.361800Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-02-21T08:06:08.935851Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15285814831535559817] 2024-02-21T08:06:08.943304Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-02-21T08:06:08.943512Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-02-21T08:06:08.943801Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-02-21T08:06:08.944191Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-02-21T08:06:08.944760Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-02-21T08:06:17.970266Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-02-22T08:02:49.711833Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7950952353667615141] 2024-02-22T08:02:49.719374Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-02-22T08:02:49.719548Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-02-22T08:02:49.719813Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-02-22T08:02:49.720185Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-02-22T08:02:49.720694Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-02-22T08:02:58.742628Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-02-23T08:08:08.322164Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7752228562803483857] 2024-02-23T08:08:08.322930Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-02-23T08:08:08.323048Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-02-23T08:08:08.323711Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-02-23T08:08:08.324193Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-02-23T08:08:08.324746Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-02-23T08:08:17.345581Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-02-24T08:10:32.803265Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_18082272597796783307] 2024-02-24T08:10:32.804597Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-02-24T08:10:32.804728Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-02-24T08:10:32.805003Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-02-24T08:10:32.805382Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-02-24T08:10:32.805777Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-02-24T08:10:41.824569Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-02-25T08:01:32.689751Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15380606258244137710] 2024-02-25T08:01:32.690501Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-02-25T08:01:32.690618Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-02-25T08:01:32.690865Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-02-25T08:01:32.691274Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-02-25T08:01:32.691767Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-02-25T08:01:41.711334Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-02-26T08:09:11.184034Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16280977196003868306] 2024-02-26T08:09:11.185546Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-02-26T08:09:11.185715Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-02-26T08:09:11.185997Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-02-26T08:09:11.186451Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-02-26T08:09:11.186884Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-02-26T08:09:20.208967Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-02-27T08:06:20.696016Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7344233602365932571] 2024-02-27T08:06:20.696737Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-02-27T08:06:20.696859Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-02-27T08:06:20.697149Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-02-27T08:06:20.697506Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-02-27T08:06:20.704204Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-02-27T08:06:29.718645Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-02-28T08:02:57.184054Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_13429709188421613047] 2024-02-28T08:02:57.191754Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-02-28T08:02:57.191990Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-02-28T08:02:57.192287Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-02-28T08:02:57.192693Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-02-28T08:02:57.193235Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-02-28T08:03:06.211684Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-02-29T08:01:16.223005Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3995103494120653401] 2024-02-29T08:01:16.223828Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-02-29T08:01:16.223948Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-02-29T08:01:16.224302Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-02-29T08:01:16.224654Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-02-29T08:01:16.225115Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-02-29T08:01:25.247135Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-03-01T08:02:56.422731Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11172206253417971394] 2024-03-01T08:02:56.430286Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-03-01T08:02:56.430487Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-03-01T08:02:56.430755Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-03-01T08:02:56.431265Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-03-01T08:02:56.431714Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-03-01T08:03:05.454104Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-03-02T08:06:32.085989Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17915101160716386076] 2024-03-02T08:06:32.086746Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-03-02T08:06:32.086878Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-03-02T08:06:32.093345Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-03-02T08:06:32.093774Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-03-02T08:06:32.094273Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-03-02T08:06:41.109314Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-03-03T08:09:51.885465Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15099748097699132117] 2024-03-03T08:09:51.886144Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-03-03T08:09:51.892943Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-03-03T08:09:51.893268Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-03-03T08:09:51.893651Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-03-03T08:09:51.894199Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-03-03T08:10:00.922210Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-03-04T08:03:23.341065Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12979934175089337831] 2024-03-04T08:03:23.342398Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-03-04T08:03:23.342537Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-03-04T08:03:23.342789Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-03-04T08:03:23.343272Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-03-04T08:03:23.343677Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-03-04T08:03:32.358727Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-03-05T08:05:56.291301Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10424969705025721478] 2024-03-05T08:05:56.292088Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-03-05T08:05:56.292230Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-03-05T08:05:56.292501Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-03-05T08:05:56.299753Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-03-05T08:05:56.300199Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-03-05T08:06:05.317609Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-03-06T08:05:55.522274Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1060045799817027342] 2024-03-06T08:05:55.522987Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-03-06T08:05:55.523127Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-03-06T08:05:55.523382Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-03-06T08:05:55.523742Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-03-06T08:05:55.530687Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-03-06T08:06:04.558031Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-03-07T08:03:11.875690Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5738356809148865650] 2024-03-07T08:03:11.883230Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-03-07T08:03:11.883393Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-03-07T08:03:11.883664Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-03-07T08:03:11.884091Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-03-07T08:03:11.884593Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-03-07T08:03:20.911135Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-03-08T08:08:15.573723Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_13566832306580404505] 2024-03-08T08:08:15.574534Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-03-08T08:08:15.574670Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-03-08T08:08:15.574920Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-03-08T08:08:15.582219Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-03-08T08:08:15.582839Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-03-08T08:08:24.599846Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-03-09T08:06:35.732057Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2132775000393840490] 2024-03-09T08:06:35.733547Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-03-09T08:06:35.733681Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-03-09T08:06:35.733921Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-03-09T08:06:35.734334Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-03-09T08:06:35.734846Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-03-09T08:06:44.761206Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-03-10T08:06:30.496108Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_380972969544373232] 2024-03-10T08:06:30.497387Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-03-10T08:06:30.497518Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-03-10T08:06:30.497774Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-03-10T08:06:30.498199Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-03-10T08:06:30.498711Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-03-10T08:06:39.519804Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-03-11T08:04:09.261173Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12213356361997692329] 2024-03-11T08:04:09.268458Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-03-11T08:04:09.268639Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-03-11T08:04:09.268929Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-03-11T08:04:09.269353Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-03-11T08:04:09.269887Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-03-11T08:04:18.290846Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-03-12T02:07:43.212062Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12213356361997692329] 2024-03-12T02:07:43.219078Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-03-12T02:07:43.219242Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-03-12T02:07:43.219502Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-03-12T02:07:43.220086Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-03-12T02:07:43.220503Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-03-12T02:07:52.252911Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-03-12T08:02:30.241837Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10497355201781299053] 2024-03-12T08:02:30.242888Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-03-12T08:02:30.243026Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-03-12T08:02:30.243322Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-03-12T08:02:30.243703Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-03-12T08:02:30.244118Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-03-12T08:02:39.267025Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-03-13T08:04:43.365165Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5557640356414451797] 2024-03-13T08:04:43.372772Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-03-13T08:04:43.372966Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-03-13T08:04:43.373283Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-03-13T08:04:43.373652Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-03-13T08:04:43.374131Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-03-13T08:04:52.392221Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-03-14T08:11:07.086564Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4563877171179128800] 2024-03-14T08:11:07.087430Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-03-14T08:11:07.087553Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-03-14T08:11:07.087853Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-03-14T08:11:07.088217Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-03-14T08:11:07.088601Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-03-14T08:11:16.110425Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-03-15T02:07:50.806732Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4563877171179128800] 2024-03-15T02:07:50.814193Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-03-15T02:07:50.814356Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-03-15T02:07:50.814601Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-03-15T02:07:50.815171Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-03-15T02:07:50.815573Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-03-15T02:07:59.844505Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-03-15T08:04:57.583187Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10897571477189389306] 2024-03-15T08:04:57.584003Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-03-15T08:04:57.584116Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-03-15T08:04:57.584364Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-03-15T08:04:57.584716Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-03-15T08:04:57.585117Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-03-15T08:05:06.606503Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-03-16T08:10:23.469651Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3509094399275004205] 2024-03-16T08:10:23.470911Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-03-16T08:10:23.471046Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-03-16T08:10:23.471293Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-03-16T08:10:23.471654Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-03-16T08:10:23.472113Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-03-16T08:10:32.500286Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-03-17T08:03:37.688507Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17982246268092003411] 2024-03-17T08:03:37.695812Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-03-17T08:03:37.695965Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-03-17T08:03:37.696247Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-03-17T08:03:37.696573Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-03-17T08:03:37.697016Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-03-17T08:03:46.726228Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-03-18T08:04:45.846595Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7714629857525880474] 2024-03-18T08:04:45.849591Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-03-18T08:04:45.849725Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-03-18T08:04:45.854620Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-03-18T08:04:45.855100Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-03-18T08:04:45.855672Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-03-18T08:04:54.876282Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-03-19T08:06:26.938865Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3521099640102929765] 2024-03-19T08:06:26.940949Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-03-19T08:06:26.941142Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-03-19T08:06:26.941417Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-03-19T08:06:26.941860Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-03-19T08:06:26.942406Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-03-19T08:06:35.963491Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-03-20T08:03:03.484931Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4675600303900420495] 2024-03-20T08:03:03.485639Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-03-20T08:03:03.485760Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-03-20T08:03:03.485984Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-03-20T08:03:03.486309Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-03-20T08:03:03.493454Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-03-20T08:03:12.509030Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-03-20T20:52:42.739427Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_415811590481634104] 2024-03-20T20:52:42.746933Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-03-20T20:52:42.747093Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-03-20T20:52:42.747350Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-03-20T20:52:42.747698Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-03-20T20:52:42.748167Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-03-20T20:52:51.768711Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-03-21T08:02:42.812078Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8265156773795759933] 2024-03-21T08:02:42.812846Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-03-21T08:02:42.812967Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-03-21T08:02:42.813222Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-03-21T08:02:42.813576Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-03-21T08:02:42.820774Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-03-21T08:02:51.836265Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-03-22T08:02:20.648316Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_417917487280516291] 2024-03-22T08:02:20.649121Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-03-22T08:02:20.649249Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-03-22T08:02:20.649516Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-03-22T08:02:20.656647Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-03-22T08:02:20.657168Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-03-22T08:02:29.674617Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-03-23T08:00:56.869668Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10132117204120080464] 2024-03-23T08:00:56.871209Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-03-23T08:00:56.871340Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-03-23T08:00:56.871584Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-03-23T08:00:56.871984Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-03-23T08:00:56.872380Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-03-23T08:01:05.891062Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-03-24T08:01:36.848355Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_18101708004127536532] 2024-03-24T08:01:36.849750Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-03-24T08:01:36.849873Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-03-24T08:01:36.850138Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-03-24T08:01:36.850501Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-03-24T08:01:36.850851Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-03-24T08:01:45.868834Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-03-25T08:05:25.474316Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12645900710876748547] 2024-03-25T08:05:25.475668Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-03-25T08:05:25.475803Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-03-25T08:05:25.476043Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-03-25T08:05:25.476435Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-03-25T08:05:25.476876Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-03-25T08:05:34.497913Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-03-26T08:02:39.392425Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7825820080564181798] 2024-03-26T08:02:39.393269Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-03-26T08:02:39.393396Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-03-26T08:02:39.400340Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-03-26T08:02:39.401057Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-03-26T08:02:39.401591Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-03-26T08:02:48.423405Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-03-27T08:07:26.265093Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12653436666506597996] 2024-03-27T08:07:26.265915Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-03-27T08:07:26.266051Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-03-27T08:07:26.272991Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-03-27T08:07:26.273428Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-03-27T08:07:26.273922Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-03-27T08:07:35.288252Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-03-28T08:06:47.105698Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5671091899622167610] 2024-03-28T08:06:47.106449Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-03-28T08:06:47.106551Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-03-28T08:06:47.106800Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-03-28T08:06:47.113950Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-03-28T08:06:47.114462Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-03-28T08:06:56.144486Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-03-29T08:07:56.592281Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4506878633507967159] 2024-03-29T08:07:56.593007Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-03-29T08:07:56.593123Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-03-29T08:07:56.593424Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-03-29T08:07:56.593763Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-03-29T08:07:56.594260Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-03-29T08:08:05.616589Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-03-30T08:05:44.415329Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15078583622403081532] 2024-03-30T08:05:44.416719Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-03-30T08:05:44.416866Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-03-30T08:05:44.417159Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-03-30T08:05:44.417608Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-03-30T08:05:44.418100Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-03-30T08:05:53.440358Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-03-31T08:00:55.862539Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16860788443770745104] 2024-03-31T08:00:55.868761Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-03-31T08:00:55.868887Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-03-31T08:00:55.869121Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-03-31T08:00:55.869491Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-03-31T08:00:55.869931Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-03-31T08:01:04.890283Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-04-01T08:07:06.767908Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7198491849193425678] 2024-04-01T08:07:06.768601Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-04-01T08:07:06.768714Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-04-01T08:07:06.768954Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-04-01T08:07:06.769285Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-04-01T08:07:06.769746Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-04-01T08:07:15.787718Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-04-02T08:05:29.531040Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2187570706345835145] 2024-04-02T08:05:29.531889Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-04-02T08:05:29.532015Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-04-02T08:05:29.532284Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-04-02T08:05:29.539412Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-04-02T08:05:29.540031Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-04-02T08:05:38.555563Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-04-03T08:04:35.700401Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1784449984216356164] 2024-04-03T08:04:35.701178Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-04-03T08:04:35.701304Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-04-03T08:04:35.701559Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-04-03T08:04:35.701935Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-04-03T08:04:35.702327Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-04-03T08:04:44.724078Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-04-04T08:09:05.681830Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17270051011589914651] 2024-04-04T08:09:05.682575Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-04-04T08:09:05.682694Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-04-04T08:09:05.682939Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-04-04T08:09:05.683343Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-04-04T08:09:05.683788Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-04-04T08:09:14.711292Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-04-05T08:02:41.924581Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14146146324071875787] 2024-04-05T08:02:41.925488Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-04-05T08:02:41.925618Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-04-05T08:02:41.925880Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-04-05T08:02:41.926326Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-04-05T08:02:41.926736Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-04-05T08:02:50.947508Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-04-06T08:04:31.683215Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8733961458268830344] 2024-04-06T08:04:31.684480Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-04-06T08:04:31.684612Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-04-06T08:04:31.684859Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-04-06T08:04:31.685223Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-04-06T08:04:31.685652Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-04-06T08:04:40.703661Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-04-07T08:01:09.917243Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16717550102807983283] 2024-04-07T08:01:09.918595Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-04-07T08:01:09.918726Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-04-07T08:01:09.918966Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-04-07T08:01:09.919327Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-04-07T08:01:09.924509Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-04-07T08:01:18.949244Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-04-08T08:05:43.554493Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9764545522661942333] 2024-04-08T08:05:43.555658Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-04-08T08:05:43.555782Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-04-08T08:05:43.556025Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-04-08T08:05:43.556385Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-04-08T08:05:43.556841Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-04-08T08:05:52.582211Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-04-09T08:05:10.710015Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15210035932989782728] 2024-04-09T08:05:10.717479Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-04-09T08:05:10.717695Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-04-09T08:05:10.717967Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-04-09T08:05:10.718314Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-04-09T08:05:10.718806Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-04-09T08:05:19.737368Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-04-10T08:02:55.501015Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5712836856547142074] 2024-04-10T08:02:55.508420Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-04-10T08:02:55.508613Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-04-10T08:02:55.508881Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-04-10T08:02:55.509217Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-04-10T08:02:55.509690Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-04-10T08:03:04.525055Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-04-11T08:03:53.548961Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10677816089252668740] 2024-04-11T08:03:53.549661Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-04-11T08:03:53.556499Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-04-11T08:03:53.556790Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-04-11T08:03:53.557153Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-04-11T08:03:53.557592Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-04-11T08:04:02.577717Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-04-12T08:09:05.837975Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10222671771059986306] 2024-04-12T08:09:05.838728Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-04-12T08:09:05.838866Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-04-12T08:09:05.839164Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-04-12T08:09:05.839525Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-04-12T08:09:05.839930Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-04-12T08:09:14.861622Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-04-13T08:10:09.393303Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15626221791229421521] 2024-04-13T08:10:09.394991Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-04-13T08:10:09.395141Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-04-13T08:10:09.395423Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-04-13T08:10:09.395858Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-04-13T08:10:09.396331Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-04-13T08:10:18.415986Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-04-14T08:07:16.496412Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5504236762557604609] 2024-04-14T08:07:16.497519Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-04-14T08:07:16.497645Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-04-14T08:07:16.497903Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-04-14T08:07:16.498259Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-04-14T08:07:16.498720Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-04-14T08:07:25.518521Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-04-15T08:01:25.963267Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5391084774452357182] 2024-04-15T08:01:25.970568Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-04-15T08:01:25.970800Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-04-15T08:01:25.971108Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-04-15T08:01:25.971481Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-04-15T08:01:25.971958Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-04-15T08:01:34.992489Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-04-16T08:07:35.188576Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16048151491069585241] 2024-04-16T08:07:35.189342Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-04-16T08:07:35.189468Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-04-16T08:07:35.189732Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-04-16T08:07:35.190091Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-04-16T08:07:35.197203Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-04-16T08:07:44.212444Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-04-17T08:07:37.481997Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3806591505641900087] 2024-04-17T08:07:37.482679Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-04-17T08:07:37.489462Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-04-17T08:07:37.489759Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-04-17T08:07:37.490181Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-04-17T08:07:37.490735Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-04-17T08:07:46.511019Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-04-18T08:07:06.545691Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14066261554784503996] 2024-04-18T08:07:06.547051Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-04-18T08:07:06.547195Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-04-18T08:07:06.547467Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-04-18T08:07:06.547856Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-04-18T08:07:06.548322Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-04-18T08:07:15.573499Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-04-19T08:08:38.897569Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4067458535983258925] 2024-04-19T08:08:38.898387Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-04-19T08:08:38.898515Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-04-19T08:08:38.905435Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-04-19T08:08:38.905852Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-04-19T08:08:38.906440Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-04-19T08:08:47.939125Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-04-20T01:16:44.249592Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_13675091696967436489] 2024-04-20T01:16:44.250402Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-04-20T01:16:44.250535Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-04-20T01:16:44.250796Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-04-20T01:16:44.257521Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-04-20T01:16:44.258106Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-04-20T01:16:53.277634Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-04-20T08:06:37.969537Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1134732359512212920] 2024-04-20T08:06:37.970402Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-04-20T08:06:37.970529Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-04-20T08:06:37.971283Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-04-20T08:06:37.971648Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-04-20T08:06:37.972121Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-04-20T08:06:46.992208Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-04-21T08:05:31.932523Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_18293317152677587915] 2024-04-21T08:05:31.940039Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-04-21T08:05:31.940172Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-04-21T08:05:31.940408Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-04-21T08:05:31.940765Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-04-21T08:05:31.941184Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-04-21T08:05:40.961395Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-04-22T08:02:11.277285Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10535117224635814775] 2024-04-22T08:02:11.284609Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-04-22T08:02:11.284754Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-04-22T08:02:11.285008Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-04-22T08:02:11.285333Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-04-22T08:02:11.285804Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-04-22T08:02:20.304985Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-04-23T08:03:57.280089Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5563265360387448966] 2024-04-23T08:03:57.280834Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-04-23T08:03:57.280962Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-04-23T08:03:57.281218Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-04-23T08:03:57.281756Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-04-23T08:03:57.282307Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-04-23T08:04:06.302860Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-04-24T08:02:22.824852Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2167138466295440540] 2024-04-24T08:02:22.826468Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-04-24T08:02:22.826608Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-04-24T08:02:22.826869Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-04-24T08:02:22.827292Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-04-24T08:02:22.827779Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-04-24T08:02:31.848010Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-04-25T08:07:17.836715Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11038801653672824565] 2024-04-25T08:07:17.844207Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-04-25T08:07:17.844390Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-04-25T08:07:17.844666Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-04-25T08:07:17.845016Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-04-25T08:07:17.845525Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-04-25T08:07:26.864996Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-04-26T08:00:55.849156Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7362110647413569504] 2024-04-26T08:00:55.849930Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-04-26T08:00:55.850069Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-04-26T08:00:55.850318Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-04-26T08:00:55.850643Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-04-26T08:00:55.851172Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-04-26T08:01:04.872844Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-04-27T08:08:39.735214Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6459277589005678976] 2024-04-27T08:08:39.736613Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-04-27T08:08:39.736754Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-04-27T08:08:39.737009Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-04-27T08:08:39.737554Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-04-27T08:08:39.738120Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-04-27T08:08:48.756841Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-04-28T08:01:55.740925Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16410617170281392406] 2024-04-28T08:01:55.742474Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-04-28T08:01:55.742613Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-04-28T08:01:55.742873Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-04-28T08:01:55.743289Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-04-28T08:01:55.743736Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-04-28T08:02:04.761575Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-04-29T08:08:09.428277Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14569659357078845811] 2024-04-29T08:08:09.429702Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-04-29T08:08:09.429842Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-04-29T08:08:09.430103Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-04-29T08:08:09.430448Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-04-29T08:08:09.430965Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-04-29T08:08:18.448983Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-04-30T08:07:23.779674Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_13428964855482526977] 2024-04-30T08:07:23.780480Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-04-30T08:07:23.780601Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-04-30T08:07:23.780879Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-04-30T08:07:23.781225Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-04-30T08:07:23.788282Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-04-30T08:07:32.803033Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-05-01T08:06:17.718144Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4269101424214591120] 2024-05-01T08:06:17.725673Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-05-01T08:06:17.725809Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-05-01T08:06:17.726071Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-05-01T08:06:17.726421Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-05-01T08:06:17.726850Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-05-01T08:06:26.746276Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-05-02T08:00:41.015517Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3746627666897625000] 2024-05-02T08:00:41.022835Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-05-02T08:00:41.022975Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-05-02T08:00:41.023240Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-05-02T08:00:41.023581Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-05-02T08:00:41.024138Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-05-02T08:00:50.042458Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-05-03T08:04:58.531188Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5073067517770103512] 2024-05-03T08:04:58.532510Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-05-03T08:04:58.532640Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-05-03T08:04:58.532884Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-05-03T08:04:58.539599Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-05-03T08:04:58.540133Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-05-03T08:05:07.555748Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-05-04T08:10:06.869305Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14987906276079545281] 2024-05-04T08:10:06.870749Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-05-04T08:10:06.870887Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-05-04T08:10:06.871169Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-05-04T08:10:06.871584Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-05-04T08:10:06.872072Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-05-04T08:10:15.893538Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-05-05T08:05:46.461061Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16775587195741895553] 2024-05-05T08:05:46.462485Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-05-05T08:05:46.462631Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-05-05T08:05:46.462936Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-05-05T08:05:46.463365Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-05-05T08:05:46.463930Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-05-05T08:05:55.492237Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-05-06T08:06:32.713439Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16529127065705890522] 2024-05-06T08:06:32.714753Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-05-06T08:06:32.714877Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-05-06T08:06:32.715119Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-05-06T08:06:32.721740Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-05-06T08:06:32.722252Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-05-06T08:06:41.735131Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-05-07T08:01:59.524881Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7453814052793759439] 2024-05-07T08:01:59.525653Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-05-07T08:01:59.525789Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-05-07T08:01:59.532701Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-05-07T08:01:59.533238Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-05-07T08:01:59.533714Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-05-07T08:02:08.552857Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-05-08T08:02:13.710847Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2735688399782776134] 2024-05-08T08:02:13.712481Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-05-08T08:02:13.712617Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-05-08T08:02:13.712868Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-05-08T08:02:13.713275Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-05-08T08:02:13.713827Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-05-08T08:02:22.735579Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-05-09T08:08:17.278824Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_3] 2024-05-09T08:08:17.280206Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-05-09T08:08:17.280362Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-05-09T08:08:17.280597Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-05-09T08:08:17.280987Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-05-09T08:08:17.281383Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-05-09T08:08:26.310756Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-05-10T08:00:55.080046Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15573885827727819075] 2024-05-10T08:00:55.080892Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-05-10T08:00:55.081031Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-05-10T08:00:55.081289Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-05-10T08:00:55.081651Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-05-10T08:00:55.082178Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-05-10T08:01:04.103956Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-05-11T08:02:19.543021Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12630844577294029720] 2024-05-11T08:02:19.544511Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-05-11T08:02:19.544662Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-05-11T08:02:19.544919Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-05-11T08:02:19.545325Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-05-11T08:02:19.545872Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-05-11T08:02:28.561399Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-05-12T08:09:23.750770Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8920309732754605197] 2024-05-12T08:09:23.758239Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-05-12T08:09:23.758384Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-05-12T08:09:23.758631Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-05-12T08:09:23.759015Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-05-12T08:09:23.759476Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-05-12T08:09:32.778583Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-05-13T08:01:44.605070Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2201038376006357843] 2024-05-13T08:01:44.605923Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-05-13T08:01:44.606055Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-05-13T08:01:44.606313Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-05-13T08:01:44.606686Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-05-13T08:01:44.607151Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-05-13T08:01:53.629691Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-05-14T08:06:47.294559Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7430085584248890914] 2024-05-14T08:06:47.295377Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-05-14T08:06:47.295496Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-05-14T08:06:47.295789Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-05-14T08:06:47.296164Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-05-14T08:06:47.296558Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-05-14T08:06:56.318993Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-05-15T08:05:49.735438Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4993476615040986932] 2024-05-15T08:05:49.743215Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-05-15T08:05:49.743392Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-05-15T08:05:49.743663Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-05-15T08:05:49.744013Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-05-15T08:05:49.744530Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-05-15T08:05:58.765873Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-05-16T08:02:00.757397Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_18076293872293598231] 2024-05-16T08:02:00.758702Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-05-16T08:02:00.758835Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-05-16T08:02:00.759120Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-05-16T08:02:00.759533Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-05-16T08:02:00.759977Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-05-16T08:02:09.781477Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-05-17T08:05:25.651873Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_13363580587182203156] 2024-05-17T08:05:25.659596Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-05-17T08:05:25.659764Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-05-17T08:05:25.660061Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-05-17T08:05:25.660462Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-05-17T08:05:25.660966Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-05-17T08:05:34.685524Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-05-18T08:10:03.165816Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2742760284747203134] 2024-05-18T08:10:03.166701Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-05-18T08:10:03.166833Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-05-18T08:10:03.167087Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-05-18T08:10:03.167471Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-05-18T08:10:03.167876Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-05-18T08:10:12.189728Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-05-19T08:07:04.798745Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11190011189628914595] 2024-05-19T08:07:04.799522Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-05-19T08:07:04.799642Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-05-19T08:07:04.799909Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-05-19T08:07:04.800247Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-05-19T08:07:04.800757Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-05-19T08:07:13.822710Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-05-20T08:07:05.991976Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9249359578145808312] 2024-05-20T08:07:05.995991Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-05-20T08:07:05.996132Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-05-20T08:07:05.996381Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-05-20T08:07:05.996733Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-05-20T08:07:05.997153Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-05-20T08:07:15.016685Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-05-21T08:09:27.790257Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10919560039881382796] 2024-05-21T08:09:27.791725Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-05-21T08:09:27.791854Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-05-21T08:09:27.792097Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-05-21T08:09:27.792515Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-05-21T08:09:27.792895Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-05-21T08:09:36.807814Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-05-22T08:06:30.752535Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_13918233243956132608] 2024-05-22T08:06:30.753311Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-05-22T08:06:30.753434Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-05-22T08:06:30.753695Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-05-22T08:06:30.754082Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-05-22T08:06:30.761330Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-05-22T08:06:39.776770Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-05-23T08:07:32.639634Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_13312019951482005398] 2024-05-23T08:07:32.640385Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-05-23T08:07:32.640500Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-05-23T08:07:32.640799Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-05-23T08:07:32.641146Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-05-23T08:07:32.648420Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-05-23T08:07:41.665623Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-05-24T08:07:06.231939Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10989459426047316300] 2024-05-24T08:07:06.232725Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-05-24T08:07:06.232852Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-05-24T08:07:06.233131Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-05-24T08:07:06.233515Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-05-24T08:07:06.234063Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-05-24T08:07:15.264195Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-05-25T08:05:15.131818Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11955163462595965085] 2024-05-25T08:05:15.139418Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-05-25T08:05:15.139556Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-05-25T08:05:15.139810Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-05-25T08:05:15.140142Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-05-25T08:05:15.140707Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-05-25T08:05:24.158252Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-05-26T08:03:10.457760Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17060669142286302458] 2024-05-26T08:03:10.459364Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-05-26T08:03:10.459497Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-05-26T08:03:10.459737Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-05-26T08:03:10.460113Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-05-26T08:03:10.460635Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-05-26T08:03:19.481356Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-05-27T08:01:38.541717Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1333894024766155077] 2024-05-27T08:01:38.543492Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-05-27T08:01:38.543630Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-05-27T08:01:38.543880Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-05-27T08:01:38.544267Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-05-27T08:01:38.544660Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-05-27T08:01:47.566966Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-05-28T08:08:12.872019Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1509666628499698584] 2024-05-28T08:08:12.879916Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-05-28T08:08:12.880083Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-05-28T08:08:12.880377Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-05-28T08:08:12.880762Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-05-28T08:08:12.881435Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-05-28T08:08:21.899892Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-05-29T08:10:35.039607Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16963064584480961402] 2024-05-29T08:10:35.040422Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-05-29T08:10:35.040546Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-05-29T08:10:35.047383Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-05-29T08:10:35.047935Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-05-29T08:10:35.048414Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-05-29T08:10:44.069101Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-05-30T08:08:12.827887Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6181213798701712998] 2024-05-30T08:08:12.834833Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-05-30T08:08:12.835003Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-05-30T08:08:12.835274Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-05-30T08:08:12.835629Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-05-30T08:08:12.836136Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-05-30T08:08:21.858464Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-05-30T19:39:09.033028Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6181213798701712998] 2024-05-30T19:39:09.040427Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-05-30T19:39:09.040591Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-05-30T19:39:09.040852Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-05-30T19:39:09.041444Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-05-30T19:39:09.041849Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-05-30T19:39:18.056679Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-05-31T08:09:26.199342Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8211136905960603884] 2024-05-31T08:09:26.200149Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-05-31T08:09:26.200285Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-05-31T08:09:26.200545Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-05-31T08:09:26.200883Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-05-31T08:09:26.201347Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-05-31T08:09:35.221808Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-06-01T08:02:35.552988Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_13801966595055623711] 2024-06-01T08:02:35.554590Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-06-01T08:02:35.554733Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-06-01T08:02:35.554997Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-06-01T08:02:35.555455Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-06-01T08:02:35.555973Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-06-01T08:02:44.576720Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-06-02T08:04:43.950814Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2971976993772740929] 2024-06-02T08:04:43.952624Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-06-02T08:04:43.952761Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-06-02T08:04:43.952998Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-06-02T08:04:43.953359Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-06-02T08:04:43.953837Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-06-02T08:04:52.975424Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-06-03T08:05:34.022643Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10347301434449615239] 2024-06-03T08:05:34.024143Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-06-03T08:05:34.024283Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-06-03T08:05:34.024549Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-06-03T08:05:34.024973Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-06-03T08:05:34.025551Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-06-03T08:05:43.047831Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-06-04T08:09:21.209376Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6912726952403671448] 2024-06-04T08:09:21.210185Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-06-04T08:09:21.210303Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-06-04T08:09:21.210601Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-06-04T08:09:21.210985Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-06-04T08:09:21.211401Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-06-04T08:09:30.232592Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-06-05T08:05:59.895268Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11022049150464129537] 2024-06-05T08:05:59.896810Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-06-05T08:05:59.896940Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-06-05T08:05:59.897187Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-06-05T08:05:59.897583Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-06-05T08:05:59.897968Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-06-05T08:06:08.920904Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-06-06T08:09:42.194257Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17302729224526979005] 2024-06-06T08:09:42.195009Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-06-06T08:09:42.195140Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-06-06T08:09:42.195397Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-06-06T08:09:42.195727Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-06-06T08:09:42.202641Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-06-06T08:09:51.221626Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-06-07T08:10:05.423778Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12826911624671229376] 2024-06-07T08:10:05.424489Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-06-07T08:10:05.424599Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-06-07T08:10:05.424881Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-06-07T08:10:05.425226Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-06-07T08:10:05.425621Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-06-07T08:10:14.451738Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-06-08T08:03:42.934294Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_662407142477694998] 2024-06-08T08:03:42.935608Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-06-08T08:03:42.935745Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-06-08T08:03:42.936022Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-06-08T08:03:42.936390Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-06-08T08:03:42.936861Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-06-08T08:03:51.957125Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-06-09T08:03:28.098537Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15083724965858425593] 2024-06-09T08:03:28.099916Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-06-09T08:03:28.100071Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-06-09T08:03:28.100355Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-06-09T08:03:28.100802Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-06-09T08:03:28.101311Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-06-09T08:03:37.122675Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-06-10T08:06:10.047588Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10803511977662243269] 2024-06-10T08:06:10.048324Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-06-10T08:06:10.048462Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-06-10T08:06:10.048719Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-06-10T08:06:10.049050Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-06-10T08:06:10.056323Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-06-10T08:06:19.076897Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-06-11T02:10:20.813910Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10803511977662243269] 2024-06-11T02:10:20.815184Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-06-11T02:10:20.815316Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-06-11T02:10:20.815584Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-06-11T02:10:20.816256Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-06-11T02:10:20.816817Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-06-11T02:10:29.856081Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-06-11T08:04:42.219757Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14175261224845184764] 2024-06-11T08:04:42.227340Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-06-11T08:04:42.227516Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-06-11T08:04:42.227805Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-06-11T08:04:42.228151Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-06-11T08:04:42.228628Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-06-11T08:04:51.246570Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-06-12T08:00:33.789648Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1808799354944027200] 2024-06-12T08:00:33.797117Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-06-12T08:00:33.797309Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-06-12T08:00:33.797580Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-06-12T08:00:33.797970Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-06-12T08:00:33.798502Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-06-12T08:00:42.822223Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-06-13T08:01:56.718666Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11246351156779734039] 2024-06-13T08:01:56.719455Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-06-13T08:01:56.719580Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-06-13T08:01:56.719830Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-06-13T08:01:56.720161Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-06-13T08:01:56.720711Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-06-13T08:02:05.742740Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-06-14T07:44:42.100978Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_1] 2024-06-14T07:44:42.109759Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-06-14T07:44:42.110028Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-06-14T07:44:42.114047Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-06-14T07:44:42.118106Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-06-14T07:44:42.118776Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-06-14T07:44:51.132101Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-06-14T08:05:46.129942Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12421674221337180493] 2024-06-14T08:05:46.130820Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-06-14T08:05:46.131029Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-06-14T08:05:46.131536Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-06-14T08:05:46.132107Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-06-14T08:05:46.132987Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-06-14T08:05:55.154208Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-06-15T08:07:24.240504Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9547176649315465574] 2024-06-15T08:07:24.242228Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-06-15T08:07:24.242381Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-06-15T08:07:24.242707Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-06-15T08:07:24.243279Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-06-15T08:07:24.244004Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-06-15T08:07:33.264041Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-06-16T08:05:29.149099Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_13210486431633317622] 2024-06-16T08:05:29.155375Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-06-16T08:05:29.155550Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-06-16T08:05:29.155893Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-06-16T08:05:29.156395Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-06-16T08:05:29.157091Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-06-16T08:05:38.177100Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-06-17T08:09:06.651263Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1796214478418778321] 2024-06-17T08:09:06.653430Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-06-17T08:09:06.653568Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-06-17T08:09:06.653914Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-06-17T08:09:06.654292Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-06-17T08:09:06.654756Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-06-17T08:09:15.682656Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-06-18T08:04:20.295118Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_13885716887540447045] 2024-06-18T08:04:20.301684Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-06-18T08:04:20.301865Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-06-18T08:04:20.302247Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-06-18T08:04:20.302759Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-06-18T08:04:20.303508Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-06-18T08:04:29.320270Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-06-19T08:00:36.192089Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4343533285118421767] 2024-06-19T08:00:36.193007Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-06-19T08:00:36.193178Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-06-19T08:00:36.198834Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-06-19T08:00:36.199408Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-06-19T08:00:36.200098Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-06-19T08:00:45.218884Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-06-20T08:04:15.773332Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_630910184714104430] 2024-06-20T08:04:15.779864Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-06-20T08:04:15.780036Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-06-20T08:04:15.780566Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-06-20T08:04:15.781082Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-06-20T08:04:15.781792Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-06-20T08:04:24.800213Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-06-21T08:06:22.380532Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8931384807114567844] 2024-06-21T08:06:22.382011Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-06-21T08:06:22.382188Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-06-21T08:06:22.382577Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-06-21T08:06:22.383175Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-06-21T08:06:22.383868Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-06-21T08:06:31.404100Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-06-22T08:08:22.562112Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10040684107508271397] 2024-06-22T08:08:22.568541Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-06-22T08:08:22.568767Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-06-22T08:08:22.569185Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-06-22T08:08:22.569631Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-06-22T08:08:22.570255Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-06-22T08:08:31.585175Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-06-23T08:07:18.808828Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16933575063020473631] 2024-06-23T08:07:18.811698Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-06-23T08:07:18.811902Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-06-23T08:07:18.812247Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-06-23T08:07:18.812769Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-06-23T08:07:18.813600Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-06-23T08:07:27.836517Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-06-24T08:03:45.752314Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9632980244475480139] 2024-06-24T08:03:45.753199Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-06-24T08:03:45.753479Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-06-24T08:03:45.753836Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-06-24T08:03:45.754307Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-06-24T08:03:45.760411Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-06-24T08:03:54.775569Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-06-25T08:08:45.147532Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12063415041563606802] 2024-06-25T08:08:45.148476Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-06-25T08:08:45.154145Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-06-25T08:08:45.154767Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-06-25T08:08:45.155430Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-06-25T08:08:45.156286Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-06-25T08:08:54.173977Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-06-26T08:09:52.705792Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17333092771298131302] 2024-06-26T08:09:52.707370Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-06-26T08:09:52.707519Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-06-26T08:09:52.707855Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-06-26T08:09:52.708395Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-06-26T08:09:52.709012Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-06-26T08:10:01.723911Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-06-27T08:09:00.357532Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2434167402270645310] 2024-06-27T08:09:00.359558Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-06-27T08:09:00.359743Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-06-27T08:09:00.360101Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-06-27T08:09:00.360802Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-06-27T08:09:00.361478Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-06-27T08:09:09.376783Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-06-28T08:05:40.439113Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16174047883345162418] 2024-06-28T08:05:40.441004Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-06-28T08:05:40.441178Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-06-28T08:05:40.441668Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-06-28T08:05:40.442222Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-06-28T08:05:40.443020Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-06-28T08:05:49.467010Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-06-29T08:00:50.721170Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1562910774997146606] 2024-06-29T08:00:50.723229Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-06-29T08:00:50.723436Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-06-29T08:00:50.723770Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-06-29T08:00:50.724361Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-06-29T08:00:50.729852Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-06-29T08:00:59.745307Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-06-30T08:05:54.745555Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11125422850145266467] 2024-06-30T08:05:54.747911Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-06-30T08:05:54.748195Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-06-30T08:05:54.748683Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-06-30T08:05:54.749231Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-06-30T08:05:54.749864Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-06-30T08:06:03.773321Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-07-01T08:05:56.662948Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7960060295677627047] 2024-07-01T08:05:56.669269Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-07-01T08:05:56.669650Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-07-01T08:05:56.670099Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-07-01T08:05:56.670994Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-07-01T08:05:56.671768Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-07-01T08:06:05.691866Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-07-02T08:02:40.858638Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6565466361184409134] 2024-07-02T08:02:40.865677Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-07-02T08:02:40.865895Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-07-02T08:02:40.866294Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-07-02T08:02:40.866810Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-07-02T08:02:40.867452Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-07-02T08:02:49.888428Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-07-03T02:10:57.306600Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6565466361184409134] 2024-07-03T02:10:57.307543Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-07-03T02:10:57.313195Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-07-03T02:10:57.313618Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-07-03T02:10:57.314340Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-07-03T02:10:57.314871Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-07-03T02:11:06.342141Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-07-03T08:07:14.261623Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_304946982649606943] 2024-07-03T08:07:14.262528Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-07-03T08:07:14.262714Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-07-03T08:07:14.268638Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-07-03T08:07:14.269178Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-07-03T08:07:14.269790Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-07-03T08:07:23.288109Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-07-04T08:04:25.792148Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16987211765590200625] 2024-07-04T08:04:25.793379Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-07-04T08:04:25.798213Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-07-04T08:04:25.798610Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-07-04T08:04:25.799113Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-07-04T08:04:25.799701Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-07-04T08:04:34.817536Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-07-05T08:01:26.269517Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6643461623461400978] 2024-07-05T08:01:26.271483Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-07-05T08:01:26.271678Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-07-05T08:01:26.272122Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-07-05T08:01:26.273260Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-07-05T08:01:26.274185Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-07-05T08:01:35.297624Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-07-06T08:08:04.478412Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_363079174893060077] 2024-07-06T08:08:04.484911Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-07-06T08:08:04.485179Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-07-06T08:08:04.485593Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-07-06T08:08:04.486081Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-07-06T08:08:04.487251Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-07-06T08:08:13.518109Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-07-07T08:05:31.561923Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12256276084392469179] 2024-07-07T08:05:31.563792Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-07-07T08:05:31.564008Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-07-07T08:05:31.564453Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-07-07T08:05:31.565032Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-07-07T08:05:31.566195Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-07-07T08:05:40.586192Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-07-08T08:02:47.020442Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5622496070943254936] 2024-07-08T08:02:47.022269Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-07-08T08:02:47.022446Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-07-08T08:02:47.022858Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-07-08T08:02:47.023467Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-07-08T08:02:47.024609Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-07-08T08:02:56.045613Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-07-09T08:01:49.705976Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5090007520320580378] 2024-07-09T08:01:49.706913Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-07-09T08:01:49.707169Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-07-09T08:01:49.712900Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-07-09T08:01:49.713389Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-07-09T08:01:49.714166Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-07-09T08:01:58.741714Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-07-10T08:01:24.706054Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17191144205583407097] 2024-07-10T08:01:24.706980Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-07-10T08:01:24.707147Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-07-10T08:01:24.707567Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-07-10T08:01:24.708012Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-07-10T08:01:24.708587Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-07-10T08:01:33.730004Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-07-11T08:01:23.076407Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_909558405585972549] 2024-07-11T08:01:23.078504Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-07-11T08:01:23.078673Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-07-11T08:01:23.079013Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-07-11T08:01:23.080943Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-07-11T08:01:23.082807Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-07-11T08:01:32.102214Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-07-12T08:03:34.469869Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14440504300053846539] 2024-07-12T08:03:34.470926Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-07-12T08:03:34.471193Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-07-12T08:03:34.471538Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-07-12T08:03:34.472238Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-07-12T08:03:34.473022Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-07-12T08:03:43.490815Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-07-13T08:05:42.659759Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8744676110580084924] 2024-07-13T08:05:42.662104Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-07-13T08:05:42.662271Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-07-13T08:05:42.662624Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-07-13T08:05:42.667668Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-07-13T08:05:42.668385Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-07-13T08:05:51.683990Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-07-14T08:05:19.031709Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5316425779112350068] 2024-07-14T08:05:19.033415Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-07-14T08:05:19.033643Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-07-14T08:05:19.034005Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-07-14T08:05:19.034652Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-07-14T08:05:19.035447Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-07-14T08:05:28.056793Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-07-15T08:07:05.117259Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14860167106581296947] 2024-07-15T08:07:05.118055Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-07-15T08:07:05.118271Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-07-15T08:07:05.123508Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-07-15T08:07:05.124106Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-07-15T08:07:05.124837Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-07-15T08:07:14.142793Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-07-16T08:07:43.029153Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9522259274270576866] 2024-07-16T08:07:43.030130Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-07-16T08:07:43.030303Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-07-16T08:07:43.030703Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-07-16T08:07:43.031185Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-07-16T08:07:43.032542Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-07-16T08:07:52.054036Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-07-17T02:08:04.307724Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9522259274270576866] 2024-07-17T02:08:04.315046Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-07-17T02:08:04.315231Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-07-17T02:08:04.315605Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-07-17T02:08:04.316911Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-07-17T02:08:04.317745Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-07-17T02:08:13.339024Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-07-17T08:10:06.744763Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17614761525354534093] 2024-07-17T08:10:06.745796Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-07-17T08:10:06.746014Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-07-17T08:10:06.746435Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-07-17T08:10:06.746984Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-07-17T08:10:06.753413Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-07-17T08:10:15.769645Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-07-18T08:03:04.207050Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1877148394301735805] 2024-07-18T08:03:04.208938Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-07-18T08:03:04.209105Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-07-18T08:03:04.209400Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-07-18T08:03:04.209938Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-07-18T08:03:04.210485Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-07-18T08:03:13.228543Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-07-19T02:09:27.074644Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1877148394301735805] 2024-07-19T02:09:27.075550Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-07-19T02:09:27.075751Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-07-19T02:09:27.076125Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-07-19T02:09:27.082506Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-07-19T02:09:27.083073Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-07-19T02:09:36.120541Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-07-19T08:06:02.829846Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2663506832493839086] 2024-07-19T08:06:02.835536Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-07-19T08:06:02.835697Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-07-19T08:06:02.836060Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-07-19T08:06:02.836607Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-07-19T08:06:02.837354Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-07-19T08:06:11.857957Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-07-20T08:07:18.239011Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_562653963465031223] 2024-07-20T08:07:18.240527Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-07-20T08:07:18.240713Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-07-20T08:07:18.241107Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-07-20T08:07:18.241838Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-07-20T08:07:18.242462Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-07-20T08:07:27.261324Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-07-21T08:05:47.974131Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5803395122581357638] 2024-07-21T08:05:47.975003Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-07-21T08:05:47.975156Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-07-21T08:05:47.975642Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-07-21T08:05:47.976295Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-07-21T08:05:47.976856Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-07-21T08:05:57.000074Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-07-22T08:06:05.429899Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17088932807105422646] 2024-07-22T08:06:05.431245Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-07-22T08:06:05.431451Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-07-22T08:06:05.431838Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-07-22T08:06:05.432891Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-07-22T08:06:05.433477Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-07-22T08:06:14.451118Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-07-23T08:01:39.802113Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14718736271950640402] 2024-07-23T08:01:39.804123Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-07-23T08:01:39.804359Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-07-23T08:01:39.804748Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-07-23T08:01:39.805431Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-07-23T08:01:39.805987Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-07-23T08:01:48.827189Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-07-24T08:05:45.441374Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_805894561112221174] 2024-07-24T08:05:45.442391Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-07-24T08:05:45.442633Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-07-24T08:05:45.443036Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-07-24T08:05:45.449050Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-07-24T08:05:45.449708Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-07-24T08:05:54.465227Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-07-25T08:06:26.608241Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_13019176946661324748] 2024-07-25T08:06:26.609327Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-07-25T08:06:26.609548Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-07-25T08:06:26.609891Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-07-25T08:06:26.610391Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-07-25T08:06:26.616550Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-07-25T08:06:35.634309Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-07-26T08:03:44.112772Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6174048821641702066] 2024-07-26T08:03:44.114598Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-07-26T08:03:44.114782Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-07-26T08:03:44.115114Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-07-26T08:03:44.115676Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-07-26T08:03:44.116230Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-07-26T08:03:53.137852Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-07-27T08:07:31.741443Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2981986560295334891] 2024-07-27T08:07:31.742187Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-07-27T08:07:31.742360Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-07-27T08:07:31.742700Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-07-27T08:07:31.743261Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-07-27T08:07:31.749618Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-07-27T08:07:40.765192Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-07-28T08:10:30.165170Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3423301135475314746] 2024-07-28T08:10:30.167815Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-07-28T08:10:30.168037Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-07-28T08:10:30.168473Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-07-28T08:10:30.169027Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-07-28T08:10:30.169699Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-07-28T08:10:39.190861Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-07-29T08:01:22.983156Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14816853771701962860] 2024-07-29T08:01:22.985274Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-07-29T08:01:22.990527Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-07-29T08:01:22.991130Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-07-29T08:01:22.991771Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-07-29T08:01:22.992429Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-07-29T08:01:32.012530Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-07-30T08:08:13.089881Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15503126629227558418] 2024-07-30T08:08:13.090810Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-07-30T08:08:13.096674Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-07-30T08:08:13.097027Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-07-30T08:08:13.097540Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-07-30T08:08:13.098160Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-07-30T08:08:22.116578Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-07-31T08:05:01.043402Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6959274715611374456] 2024-07-31T08:05:01.044535Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-07-31T08:05:01.044759Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-07-31T08:05:01.045160Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-07-31T08:05:01.046286Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-07-31T08:05:01.048247Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-07-31T08:05:10.068480Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-08-01T08:05:56.060404Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11426303806026682336] 2024-08-01T08:05:56.067357Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-08-01T08:05:56.067540Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-08-01T08:05:56.067921Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-08-01T08:05:56.068488Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-08-01T08:05:56.069189Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-08-01T08:06:05.100786Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-08-02T08:05:00.173441Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11301224300348201365] 2024-08-02T08:05:00.174427Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-08-02T08:05:00.174610Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-08-02T08:05:00.180645Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-08-02T08:05:00.181252Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-08-02T08:05:00.181809Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-08-02T08:05:09.198005Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-08-03T08:08:42.654963Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1343889672910569993] 2024-08-03T08:08:42.656782Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-08-03T08:08:42.657001Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-08-03T08:08:42.657330Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-08-03T08:08:42.657863Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-08-03T08:08:42.663464Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-08-03T08:08:51.679164Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-08-04T08:09:38.458886Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8470604009624585891] 2024-08-04T08:09:38.461035Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-08-04T08:09:38.461271Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-08-04T08:09:38.461676Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-08-04T08:09:38.462494Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-08-04T08:09:38.463072Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-08-04T08:09:47.484094Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-08-05T08:06:45.874845Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1783485483391128715] 2024-08-05T08:06:45.876673Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-08-05T08:06:45.876851Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-08-05T08:06:45.877198Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-08-05T08:06:45.882504Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-08-05T08:06:45.883201Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-08-05T08:06:54.904757Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-08-06T08:02:41.121455Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4404539834295849479] 2024-08-06T08:02:41.127869Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-08-06T08:02:41.128045Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-08-06T08:02:41.128422Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-08-06T08:02:41.129020Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-08-06T08:02:41.129685Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-08-06T08:02:50.148228Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-08-07T08:01:35.430353Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4774468397395436624] 2024-08-07T08:01:35.432447Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-08-07T08:01:35.432692Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-08-07T08:01:35.433119Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-08-07T08:01:35.433658Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-08-07T08:01:35.438941Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-08-07T08:01:44.453948Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-08-08T08:00:36.816799Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14031123578836534068] 2024-08-08T08:00:36.817867Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-08-08T08:00:36.818068Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-08-08T08:00:36.818464Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-08-08T08:00:36.818924Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-08-08T08:00:36.819618Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-08-08T08:00:45.841420Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-08-09T08:06:13.087457Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14440840419670729721] 2024-08-09T08:06:13.088395Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-08-09T08:06:13.088617Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-08-09T08:06:13.088977Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-08-09T08:06:13.089436Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-08-09T08:06:13.090033Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-08-09T08:06:22.110376Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-08-10T08:07:48.031044Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8274411450269494330] 2024-08-10T08:07:48.033524Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-08-10T08:07:48.033788Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-08-10T08:07:48.034286Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-08-10T08:07:48.034982Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-08-10T08:07:48.035926Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-08-10T08:07:57.059080Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-08-11T08:08:33.804661Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3444137014316262706] 2024-08-11T08:08:33.806485Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-08-11T08:08:33.806744Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-08-11T08:08:33.807786Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-08-11T08:08:33.809369Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-08-11T08:08:33.810047Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-08-11T08:08:42.827000Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-08-12T08:05:41.566089Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4197032113046478425] 2024-08-12T08:05:41.568110Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-08-12T08:05:41.568276Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-08-12T08:05:41.568602Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-08-12T08:05:41.569205Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-08-12T08:05:41.569835Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-08-12T08:05:50.590260Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-08-13T08:05:37.101669Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5325227946482379764] 2024-08-13T08:05:37.103225Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-08-13T08:05:37.103409Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-08-13T08:05:37.103741Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-08-13T08:05:37.104339Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-08-13T08:05:37.104906Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-08-13T08:05:46.126265Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-08-14T08:03:53.520666Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11854257149884360706] 2024-08-14T08:03:53.521542Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-08-14T08:03:53.521731Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-08-14T08:03:53.522150Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-08-14T08:03:53.522932Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-08-14T08:03:53.529245Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-08-14T08:04:02.546981Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-08-15T08:07:59.501768Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7569997519357599112] 2024-08-15T08:07:59.502844Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-08-15T08:07:59.503055Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-08-15T08:07:59.503482Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-08-15T08:07:59.504079Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-08-15T08:07:59.504698Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-08-15T08:08:08.527320Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-08-16T08:09:27.389472Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14905553726501207017] 2024-08-16T08:09:27.391394Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-08-16T08:09:27.391635Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-08-16T08:09:27.391978Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-08-16T08:09:27.392449Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-08-16T08:09:27.393006Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-08-16T08:09:36.410034Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-08-17T08:08:07.428205Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7021929584312326277] 2024-08-17T08:08:07.429828Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-08-17T08:08:07.430037Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-08-17T08:08:07.430494Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-08-17T08:08:07.431197Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-08-17T08:08:07.431968Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-08-17T08:08:16.453385Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-08-18T08:10:11.949336Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8806364577803518848] 2024-08-18T08:10:11.950943Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-08-18T08:10:11.951167Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-08-18T08:10:11.951564Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-08-18T08:10:11.952154Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-08-18T08:10:11.952626Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-08-18T08:10:20.977357Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-08-19T08:01:13.655666Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7213138907470157035] 2024-08-19T08:01:13.656536Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-08-19T08:01:13.656727Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-08-19T08:01:13.657090Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-08-19T08:01:13.657588Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-08-19T08:01:13.663810Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-08-19T08:01:22.680741Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-08-20T08:08:08.195192Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6932898476685784441] 2024-08-20T08:08:08.195992Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-08-20T08:08:08.196158Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-08-20T08:08:08.196585Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-08-20T08:08:08.203022Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-08-20T08:08:08.203745Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-08-20T08:08:17.219618Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-08-21T08:06:52.068336Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15861880545192447489] 2024-08-21T08:06:52.069409Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-08-21T08:06:52.069605Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-08-21T08:06:52.069956Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-08-21T08:06:52.070579Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-08-21T08:06:52.071162Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-08-21T08:07:01.092423Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-08-22T08:04:58.056795Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10456994616471991436] 2024-08-22T08:04:58.059547Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-08-22T08:04:58.059694Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-08-22T08:04:58.060072Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-08-22T08:04:58.060564Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-08-22T08:04:58.062949Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-08-22T08:05:07.083576Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-08-22T09:52:13.163018Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9816015932374559561] 2024-08-22T09:52:13.169749Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-08-22T09:52:13.169932Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-08-22T09:52:13.170355Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-08-22T09:52:13.170841Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-08-22T09:52:13.171551Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-08-22T09:52:22.190557Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-08-23T08:01:04.196983Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14257740462119848634] 2024-08-23T08:01:04.197890Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-08-23T08:01:04.203760Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-08-23T08:01:04.204210Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-08-23T08:01:04.213580Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-08-23T08:01:04.214476Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-08-23T08:01:13.255010Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-08-24T08:07:45.384323Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5616996073601733562] 2024-08-24T08:07:45.385179Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-08-24T08:07:45.385352Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-08-24T08:07:45.391063Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-08-24T08:07:45.391692Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-08-24T08:07:45.392716Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-08-24T08:07:54.414067Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-08-25T08:08:49.575571Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12875044833015842943] 2024-08-25T08:08:49.582683Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-08-25T08:08:49.582913Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-08-25T08:08:49.583236Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-08-25T08:08:49.583736Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-08-25T08:08:49.584524Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-08-25T08:08:58.605374Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-08-26T08:10:44.918284Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3407375424954505327] 2024-08-26T08:10:44.919881Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-08-26T08:10:44.920001Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-08-26T08:10:44.921364Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-08-26T08:10:44.921900Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-08-26T08:10:44.926625Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-08-26T08:10:53.946797Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-08-27T08:03:23.558903Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8961015272304754577] 2024-08-27T08:03:23.565049Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-08-27T08:03:23.565329Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-08-27T08:03:23.565715Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-08-27T08:03:23.566383Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-08-27T08:03:23.566996Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-08-27T08:03:32.588374Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-08-28T08:06:09.065875Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17610533107860228669] 2024-08-28T08:06:09.073159Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-08-28T08:06:09.073366Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-08-28T08:06:09.074001Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-08-28T08:06:09.074739Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-08-28T08:06:09.075297Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-08-28T08:06:18.099430Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-08-29T08:08:01.285002Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7437645787459447747] 2024-08-29T08:08:01.285858Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-08-29T08:08:01.286061Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-08-29T08:08:01.286524Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-08-29T08:08:01.287268Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-08-29T08:08:01.287845Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-08-29T08:08:10.308645Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-08-30T08:03:29.401655Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1784949644000098327] 2024-08-30T08:03:29.402541Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-08-30T08:03:29.402713Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-08-30T08:03:29.408485Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-08-30T08:03:29.409251Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-08-30T08:03:29.409949Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-08-30T08:03:38.425348Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-08-31T08:04:39.114157Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1233546883259250887] 2024-08-31T08:04:39.121237Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-08-31T08:04:39.121476Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-08-31T08:04:39.121831Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-08-31T08:04:39.122395Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-08-31T08:04:39.123122Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-08-31T08:04:48.143979Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-09-01T08:05:14.114345Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_13905957825947220935] 2024-09-01T08:05:14.116415Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-09-01T08:05:14.116596Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-09-01T08:05:14.116944Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-09-01T08:05:14.117509Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-09-01T08:05:14.118281Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-09-01T08:05:23.140855Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-09-02T08:08:12.563106Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4253789220776375134] 2024-09-02T08:08:12.569345Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-09-02T08:08:12.569515Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-09-02T08:08:12.569905Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-09-02T08:08:12.570480Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-09-02T08:08:12.571174Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-09-02T08:08:21.592786Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-09-03T08:03:22.929034Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4298957156614689151] 2024-09-03T08:03:22.930485Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-09-03T08:03:22.930679Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-09-03T08:03:22.931023Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-09-03T08:03:22.931518Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-09-03T08:03:22.932006Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-09-03T08:03:31.952965Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-09-04T08:02:36.173177Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5699031992280876318] 2024-09-04T08:02:36.174018Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-09-04T08:02:36.174177Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-09-04T08:02:36.174639Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-09-04T08:02:36.180373Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-09-04T08:02:36.180941Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-09-04T08:02:45.196871Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-09-05T08:02:21.989797Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11193470701856309056] 2024-09-05T08:02:21.990842Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-09-05T08:02:21.991066Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-09-05T08:02:21.991575Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-09-05T08:02:21.997873Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-09-05T08:02:21.998719Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-09-05T08:02:31.013974Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-09-05T19:31:29.505953Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11193470701856309056] 2024-09-05T19:31:29.506836Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-09-05T19:31:29.507158Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-09-05T19:31:29.507725Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-09-05T19:31:29.508531Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-09-05T19:31:29.509074Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-09-05T19:31:38.528738Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-09-06T08:07:51.249392Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12152835211618794838] 2024-09-06T08:07:51.250203Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-09-06T08:07:51.250349Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-09-06T08:07:51.250714Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-09-06T08:07:51.251248Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-09-06T08:07:51.257553Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-09-06T08:08:00.273253Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-09-07T08:08:04.472069Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_707051937185263126] 2024-09-07T08:08:04.473834Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-09-07T08:08:04.474010Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-09-07T08:08:04.474334Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-09-07T08:08:04.474970Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-09-07T08:08:04.475659Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-09-07T08:08:13.491697Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-09-08T08:01:38.098620Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_18166238212307174365] 2024-09-08T08:01:38.100647Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-09-08T08:01:38.100853Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-09-08T08:01:38.101197Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-09-08T08:01:38.101725Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-09-08T08:01:38.102363Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-09-08T08:01:47.125324Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-09-09T08:01:11.499566Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3613619779796333253] 2024-09-09T08:01:11.501163Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-09-09T08:01:11.501356Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-09-09T08:01:11.501712Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-09-09T08:01:11.502234Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-09-09T08:01:11.502835Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-09-09T08:01:20.518428Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-09-10T08:04:49.516728Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5780097166331056909] 2024-09-10T08:04:49.517660Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-09-10T08:04:49.517829Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-09-10T08:04:49.523666Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-09-10T08:04:49.524318Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-09-10T08:04:49.525038Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-09-10T08:04:58.540523Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-09-11T08:03:45.677675Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4452170214548108457] 2024-09-11T08:03:45.685190Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-09-11T08:03:45.685375Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-09-11T08:03:45.685779Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-09-11T08:03:45.686469Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-09-11T08:03:45.687134Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-09-11T08:03:54.707251Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-09-11T23:50:27.650443Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15818238936245128667] 2024-09-11T23:50:27.652558Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-09-11T23:50:27.652780Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-09-11T23:50:27.653139Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-09-11T23:50:27.653730Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-09-11T23:50:27.654291Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-09-11T23:50:36.675171Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-09-12T08:01:48.423097Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17975416826501565968] 2024-09-12T08:01:48.429085Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-09-12T08:01:48.429282Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-09-12T08:01:48.429718Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-09-12T08:01:48.430231Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-09-12T08:01:48.430921Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-09-12T08:01:57.460590Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-09-13T08:09:07.050742Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1851528439258858996] 2024-09-13T08:09:07.052862Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-09-13T08:09:07.053035Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-09-13T08:09:07.053427Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-09-13T08:09:07.054035Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-09-13T08:09:07.058504Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-09-13T08:09:16.078278Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-09-14T08:01:58.960053Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10407897475244670911] 2024-09-14T08:01:58.962030Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-09-14T08:01:58.962247Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-09-14T08:01:58.962682Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-09-14T08:01:58.963220Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-09-14T08:01:58.963921Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-09-14T08:02:07.979716Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-09-15T08:06:10.931863Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_18244671872925906185] 2024-09-15T08:06:10.932722Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-09-15T08:06:10.932883Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-09-15T08:06:10.933188Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-09-15T08:06:10.933643Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-09-15T08:06:10.934194Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-09-15T08:06:19.954977Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-09-16T08:09:44.633421Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_13119931303073791398] 2024-09-16T08:09:44.635205Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-09-16T08:09:44.635403Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-09-16T08:09:44.641283Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-09-16T08:09:44.641880Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-09-16T08:09:44.642692Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-09-16T08:09:53.663432Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-09-17T08:09:09.808735Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_653145566859720612] 2024-09-17T08:09:09.809638Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-09-17T08:09:09.809798Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-09-17T08:09:09.810131Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-09-17T08:09:09.816199Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-09-17T08:09:09.816910Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-09-17T08:09:18.836352Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-09-18T02:08:20.769751Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_653145566859720612] 2024-09-18T02:08:20.771500Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-09-18T02:08:20.771731Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-09-18T02:08:20.772135Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-09-18T02:08:20.773008Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-09-18T02:08:20.773548Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-09-18T02:08:29.796198Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-09-18T08:04:46.146671Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6958074012257694077] 2024-09-18T08:04:46.153171Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-09-18T08:04:46.153343Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-09-18T08:04:46.153716Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-09-18T08:04:46.154222Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-09-18T08:04:46.154902Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-09-18T08:04:55.173696Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-09-19T08:02:43.499232Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14183050848240994282] 2024-09-19T08:02:43.500852Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-09-19T08:02:43.505907Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-09-19T08:02:43.506357Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-09-19T08:02:43.506877Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-09-19T08:02:43.507545Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-09-19T08:02:52.524804Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-09-20T08:03:29.732711Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14015931431001061120] 2024-09-20T08:03:29.733653Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-09-20T08:03:29.733829Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-09-20T08:03:29.739885Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-09-20T08:03:29.740496Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-09-20T08:03:29.741166Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-09-20T08:03:38.756265Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-09-20T16:30:13.731564Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9026432327873700807] 2024-09-20T16:30:13.732557Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-09-20T16:30:13.732733Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-09-20T16:30:13.733080Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-09-20T16:30:13.733682Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-09-20T16:30:13.740061Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-09-20T16:30:22.756368Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-09-21T08:10:53.722028Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16445516150763275327] 2024-09-21T08:10:53.723749Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-09-21T08:10:53.723924Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-09-21T08:10:53.724248Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-09-21T08:10:53.724868Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-09-21T08:10:53.725651Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-09-21T08:11:02.746875Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-09-22T08:04:55.192482Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10610224072474847214] 2024-09-22T08:04:55.194047Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-09-22T08:04:55.194289Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-09-22T08:04:55.194642Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-09-22T08:04:55.195316Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-09-22T08:04:55.196035Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-09-22T08:05:04.211580Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-09-23T08:05:09.266097Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2838060893129648927] 2024-09-23T08:05:09.272514Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-09-23T08:05:09.272730Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-09-23T08:05:09.273136Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-09-23T08:05:09.273650Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-09-23T08:05:09.274302Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-09-23T08:05:18.298076Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-09-24T08:01:26.544581Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2299763858284030038] 2024-09-24T08:01:26.545804Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-09-24T08:01:26.546005Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-09-24T08:01:26.551574Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-09-24T08:01:26.552172Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-09-24T08:01:26.552719Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-09-24T08:01:35.567985Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-09-25T08:02:59.354285Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3980110055312230461] 2024-09-25T08:02:59.360615Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-09-25T08:02:59.360809Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-09-25T08:02:59.361149Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-09-25T08:02:59.361646Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-09-25T08:02:59.362200Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-09-25T08:03:08.387620Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-09-26T08:01:27.159859Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_13562482707485957425] 2024-09-26T08:01:27.161308Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-09-26T08:01:27.161475Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-09-26T08:01:27.166692Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-09-26T08:01:27.167203Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-09-26T08:01:27.167893Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-09-26T08:01:36.189134Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-09-27T02:08:15.079537Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_13562482707485957425] 2024-09-27T02:08:15.085639Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-09-27T02:08:15.085824Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-09-27T02:08:15.086193Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-09-27T02:08:15.092614Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-09-27T02:08:15.093403Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-09-27T02:08:24.124969Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-09-27T08:10:07.652940Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3755507439782539678] 2024-09-27T08:10:07.653781Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-09-27T08:10:07.653965Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-09-27T08:10:07.654369Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-09-27T08:10:07.654837Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-09-27T08:10:07.661187Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-09-27T08:10:16.676758Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-09-28T08:06:36.917017Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9788093746619701813] 2024-09-28T08:06:36.918507Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-09-28T08:06:36.918707Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-09-28T08:06:36.919076Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-09-28T08:06:36.919614Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-09-28T08:06:36.920234Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-09-28T08:06:45.936389Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-09-29T08:05:20.080594Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14112258829038274013] 2024-09-29T08:05:20.081753Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-09-29T08:05:20.082058Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-09-29T08:05:20.082483Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-09-29T08:05:20.083414Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-09-29T08:05:20.084157Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-09-29T08:05:29.104046Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-09-30T08:02:12.724212Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14017326350979026277] 2024-09-30T08:02:12.726393Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-09-30T08:02:12.726635Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-09-30T08:02:12.727230Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-09-30T08:02:12.727758Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-09-30T08:02:12.728331Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-09-30T08:02:21.757242Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-10-01T08:04:46.019083Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_357370031389971564] 2024-10-01T08:04:46.020702Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-10-01T08:04:46.020879Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-10-01T08:04:46.021258Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-10-01T08:04:46.021824Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-10-01T08:04:46.022479Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-10-01T08:04:55.042527Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-10-02T02:08:05.481251Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_357370031389971564] 2024-10-02T02:08:05.488410Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-10-02T02:08:05.489242Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-10-02T02:08:05.490040Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-10-02T02:08:05.491176Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-10-02T02:08:05.492324Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-10-02T02:08:14.524452Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-10-02T08:06:04.960208Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11958512538535022066] 2024-10-02T08:06:04.961156Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-10-02T08:06:04.961332Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-10-02T08:06:04.961688Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-10-02T08:06:04.967518Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-10-02T08:06:04.968198Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-10-02T08:06:13.984101Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-10-03T08:10:13.463781Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11770310951830876161] 2024-10-03T08:10:13.465214Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-10-03T08:10:13.465420Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-10-03T08:10:13.465789Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-10-03T08:10:13.466427Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-10-03T08:10:13.467060Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-10-03T08:10:22.488943Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-10-04T08:02:04.447332Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17367086103830430713] 2024-10-04T08:02:04.448279Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-10-04T08:02:04.448455Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-10-04T08:02:04.448867Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-10-04T08:02:04.454798Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-10-04T08:02:04.455455Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-10-04T08:02:13.473169Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-10-05T08:08:48.076161Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2692709165500306822] 2024-10-05T08:08:48.077725Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-10-05T08:08:48.077905Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-10-05T08:08:48.078270Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-10-05T08:08:48.078757Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-10-05T08:08:48.084514Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-10-05T08:08:57.098856Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-10-06T08:06:16.396249Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16495363334408340397] 2024-10-06T08:06:16.397915Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-10-06T08:06:16.398113Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-10-06T08:06:16.398530Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-10-06T08:06:16.399096Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-10-06T08:06:16.399682Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-10-06T08:06:25.425092Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-10-07T08:07:44.365958Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14482827934289519384] 2024-10-07T08:07:44.367393Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-10-07T08:07:44.367587Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-10-07T08:07:44.367955Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-10-07T08:07:44.368580Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-10-07T08:07:44.369201Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-10-07T08:07:53.388017Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-10-08T02:09:04.049082Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14482827934289519384] 2024-10-08T02:09:04.055262Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-10-08T02:09:04.055472Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-10-08T02:09:04.055922Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-10-08T02:09:04.057266Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-10-08T02:09:04.057921Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-10-08T02:09:13.081851Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-10-08T08:09:19.334202Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_18104749132164495593] 2024-10-08T08:09:19.335192Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-10-08T08:09:19.335426Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-10-08T08:09:19.336618Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-10-08T08:09:19.337205Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-10-08T08:09:19.342625Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-10-08T08:09:28.360584Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-10-09T08:09:57.206831Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7006344369881030386] 2024-10-09T08:09:57.213291Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-10-09T08:09:57.213475Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-10-09T08:09:57.213798Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-10-09T08:09:57.214256Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-10-09T08:09:57.214774Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-10-09T08:10:06.229523Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-10-10T08:10:24.269353Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4400670784323042691] 2024-10-10T08:10:24.275303Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-10-10T08:10:24.275608Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-10-10T08:10:24.275975Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-10-10T08:10:24.276444Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-10-10T08:10:24.277021Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-10-10T08:10:33.295845Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-10-11T08:07:52.270708Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8614370032916312725] 2024-10-11T08:07:52.277561Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-10-11T08:07:52.277714Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-10-11T08:07:52.278078Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-10-11T08:07:52.278536Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-10-11T08:07:52.279168Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-10-11T08:08:01.297620Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-10-12T08:03:09.017099Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12424286255350547166] 2024-10-12T08:03:09.018629Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-10-12T08:03:09.018809Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-10-12T08:03:09.019145Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-10-12T08:03:09.019666Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-10-12T08:03:09.020162Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-10-12T08:03:18.034917Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-10-13T08:01:16.532842Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6305338583038829980] 2024-10-13T08:01:16.534734Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-10-13T08:01:16.534974Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-10-13T08:01:16.535295Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-10-13T08:01:16.535863Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-10-13T08:01:16.536572Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-10-13T08:01:25.557151Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-10-14T08:03:44.637668Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17109901339513952517] 2024-10-14T08:03:44.639570Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-10-14T08:03:44.639797Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-10-14T08:03:44.640245Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-10-14T08:03:44.640834Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-10-14T08:03:44.641417Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-10-14T08:03:53.662535Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-10-15T08:03:05.978207Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1914914650476575267] 2024-10-15T08:03:05.979406Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-10-15T08:03:05.979566Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-10-15T08:03:05.979885Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-10-15T08:03:05.980497Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-10-15T08:03:05.986730Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-10-15T08:03:15.001275Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-10-16T02:08:41.869758Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1914914650476575267] 2024-10-16T02:08:41.870779Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-10-16T02:08:41.871181Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-10-16T02:08:41.871610Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-10-16T02:08:41.872275Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-10-16T02:08:41.872866Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-10-16T02:08:50.893335Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-10-16T08:03:05.541828Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_766586836404741878] 2024-10-16T08:03:05.542653Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-10-16T08:03:05.542859Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-10-16T08:03:05.543301Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-10-16T08:03:05.549439Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-10-16T08:03:05.550245Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-10-16T08:03:14.574129Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-10-17T08:04:06.345195Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8034146455880726154] 2024-10-17T08:04:06.346984Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-10-17T08:04:06.347155Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-10-17T08:04:06.347479Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-10-17T08:04:06.348107Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-10-17T08:04:06.348637Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-10-17T08:04:15.371126Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-10-18T08:06:55.958379Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7437733412543493750] 2024-10-18T08:06:55.965327Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-10-18T08:06:55.965527Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-10-18T08:06:55.965931Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-10-18T08:06:55.966418Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-10-18T08:06:55.967030Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-10-18T08:07:04.984989Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-10-19T08:08:09.082682Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1192663615131818514] 2024-10-19T08:08:09.083556Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-10-19T08:08:09.083790Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-10-19T08:08:09.084152Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-10-19T08:08:09.084629Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-10-19T08:08:09.085295Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-10-19T08:08:18.106658Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-10-20T08:05:09.994890Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9371672818615997142] 2024-10-20T08:05:09.996278Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-10-20T08:05:09.996608Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-10-20T08:05:09.996944Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-10-20T08:05:10.002670Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-10-20T08:05:10.003182Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-10-20T08:05:19.017827Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-10-21T08:08:22.628643Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3527695189292855217] 2024-10-21T08:08:22.631313Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-10-21T08:08:22.631667Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-10-21T08:08:22.632111Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-10-21T08:08:22.637241Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-10-21T08:08:22.637940Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-10-21T08:08:31.656288Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-10-22T08:10:36.391300Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1868468309370737249] 2024-10-22T08:10:36.392411Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-10-22T08:10:36.392592Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-10-22T08:10:36.392963Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-10-22T08:10:36.393431Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-10-22T08:10:36.393968Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-10-22T08:10:45.414968Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-10-23T08:05:07.220663Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11539193111887884052] 2024-10-23T08:05:07.221753Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-10-23T08:05:07.221941Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-10-23T08:05:07.222336Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-10-23T08:05:07.222766Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-10-23T08:05:07.223367Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-10-23T08:05:16.244270Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-10-23T22:19:17.729378Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11539193111887884052] 2024-10-23T22:19:17.730388Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-10-23T22:19:17.730550Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-10-23T22:19:17.736924Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-10-23T22:19:17.737617Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-10-23T22:19:17.738373Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-10-23T22:19:26.762403Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-10-24T08:02:52.956544Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2070544598914273570] 2024-10-24T08:02:52.957548Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-10-24T08:02:52.957836Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-10-24T08:02:52.958249Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-10-24T08:02:52.958913Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-10-24T08:02:52.959748Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-10-24T08:03:01.980094Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-10-25T08:09:12.443401Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2378136100443100326] 2024-10-25T08:09:12.444957Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-10-25T08:09:12.445122Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-10-25T08:09:12.445445Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-10-25T08:09:12.446088Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-10-25T08:09:12.446774Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-10-25T08:09:21.462781Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-10-26T08:10:18.563345Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_18431122759136700350] 2024-10-26T08:10:18.564992Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-10-26T08:10:18.565177Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-10-26T08:10:18.565766Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-10-26T08:10:18.566523Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-10-26T08:10:18.567287Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-10-26T08:10:27.584333Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-10-27T08:03:47.938690Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_13797785165962994485] 2024-10-27T08:03:47.940173Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-10-27T08:03:47.940332Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-10-27T08:03:47.940633Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-10-27T08:03:47.941098Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-10-27T08:03:47.941565Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-10-27T08:03:56.960099Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-10-28T08:01:51.339561Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10324657484193462215] 2024-10-28T08:01:51.367226Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-10-28T08:01:51.367775Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-10-28T08:01:51.368516Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-10-28T08:01:51.375006Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-10-28T08:01:51.376276Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-10-28T08:02:00.428962Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-10-29T08:08:32.370464Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15317633603352477866] 2024-10-29T08:08:32.371472Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-10-29T08:08:32.371738Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-10-29T08:08:32.372153Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-10-29T08:08:32.378166Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-10-29T08:08:32.379062Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-10-29T08:08:41.397660Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-10-30T08:02:29.704904Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8052175415841170382] 2024-10-30T08:02:29.711344Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-10-30T08:02:29.711558Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-10-30T08:02:29.711967Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-10-30T08:02:29.712444Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-10-30T08:02:29.713081Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-10-30T08:02:38.728957Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-10-31T08:06:35.134730Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11403128048113637126] 2024-10-31T08:06:35.136036Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-10-31T08:06:35.136283Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-10-31T08:06:35.141839Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-10-31T08:06:35.142487Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-10-31T08:06:35.143332Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-10-31T08:06:44.162016Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-11-01T08:01:47.109787Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12254359563674302188] 2024-11-01T08:01:47.111576Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-11-01T08:01:47.111827Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-11-01T08:01:47.112242Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-11-01T08:01:47.112775Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-11-01T08:01:47.113324Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-11-01T08:01:56.131374Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-11-02T08:10:10.578332Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_13880391156028501846] 2024-11-02T08:10:10.579955Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-11-02T08:10:10.580094Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-11-02T08:10:10.580414Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-11-02T08:10:10.580919Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-11-02T08:10:10.581438Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-11-02T08:10:19.603067Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-11-03T08:04:46.973041Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17088891473450345007] 2024-11-03T08:04:46.974604Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-11-03T08:04:46.974791Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-11-03T08:04:46.980164Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-11-03T08:04:46.980832Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-11-03T08:04:46.981400Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-11-03T08:04:56.003885Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-11-04T08:08:30.606760Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9540327496612751345] 2024-11-04T08:08:30.613421Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-11-04T08:08:30.613596Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-11-04T08:08:30.613958Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-11-04T08:08:30.614535Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-11-04T08:08:30.615135Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-11-04T08:08:39.635722Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-11-05T08:04:34.681285Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2660062849433403823] 2024-11-05T08:04:34.682330Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-11-05T08:04:34.682509Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-11-05T08:04:34.682868Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-11-05T08:04:34.688928Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-11-05T08:04:34.689553Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-11-05T08:04:43.705223Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-11-06T08:07:50.384784Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_18228191982126707786] 2024-11-06T08:07:50.386204Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-11-06T08:07:50.386407Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-11-06T08:07:50.386742Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-11-06T08:07:50.387243Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-11-06T08:07:50.387775Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-11-06T08:07:59.402394Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-11-07T08:04:08.115536Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4764572893947051196] 2024-11-07T08:04:08.121380Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-11-07T08:04:08.121553Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-11-07T08:04:08.121900Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-11-07T08:04:08.122464Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-11-07T08:04:08.123041Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-11-07T08:04:17.142996Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-11-08T08:06:01.518251Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8321052572789536269] 2024-11-08T08:06:01.519678Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-11-08T08:06:01.519841Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-11-08T08:06:01.520209Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-11-08T08:06:01.520673Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-11-08T08:06:01.521193Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-11-08T08:06:10.541760Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-11-09T08:03:15.592441Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_315933944891016441] 2024-11-09T08:03:15.600947Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-11-09T08:03:15.601138Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-11-09T08:03:15.601506Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-11-09T08:03:15.602236Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-11-09T08:03:15.602950Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-11-09T08:03:24.622363Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-11-10T08:07:54.969716Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14342461536990164720] 2024-11-10T08:07:54.971427Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-11-10T08:07:54.971599Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-11-10T08:07:54.971948Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-11-10T08:07:54.976998Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-11-10T08:07:54.977536Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-11-10T08:08:03.992936Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-11-11T08:07:23.570571Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16254188076237198122] 2024-11-11T08:07:23.571563Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-11-11T08:07:23.571753Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-11-11T08:07:23.572113Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-11-11T08:07:23.572615Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-11-11T08:07:23.578101Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-11-11T08:07:32.593572Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-11-12T08:03:42.244694Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2047302549193358154] 2024-11-12T08:03:42.245662Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-11-12T08:03:42.245832Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-11-12T08:03:42.251726Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-11-12T08:03:42.252703Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-11-12T08:03:42.253273Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-11-12T08:03:51.268599Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-11-13T08:01:55.322237Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2585966221456947570] 2024-11-13T08:01:55.323791Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-11-13T08:01:55.323952Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-11-13T08:01:55.324298Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-11-13T08:01:55.324896Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-11-13T08:01:55.325548Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-11-13T08:02:04.344268Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-11-14T08:01:17.445699Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11161732173087807078] 2024-11-14T08:01:17.447729Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-11-14T08:01:17.447902Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-11-14T08:01:17.448369Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-11-14T08:01:17.448926Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-11-14T08:01:17.449491Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-11-14T08:01:26.470354Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-11-15T08:08:15.546952Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8815131318540212879] 2024-11-15T08:08:15.548646Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-11-15T08:08:15.548815Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-11-15T08:08:15.549333Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-11-15T08:08:15.550318Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-11-15T08:08:15.550826Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-11-15T08:08:24.575442Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-11-16T08:06:09.923928Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6621997700308287737] 2024-11-16T08:06:09.930471Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-11-16T08:06:09.930663Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-11-16T08:06:09.935155Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-11-16T08:06:09.935815Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-11-16T08:06:09.936518Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-11-16T08:06:18.961261Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-11-17T08:01:40.766919Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14922454683385478549] 2024-11-17T08:01:40.768556Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-11-17T08:01:40.769025Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-11-17T08:01:40.775824Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-11-17T08:01:40.776959Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-11-17T08:01:40.777934Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-11-17T08:01:49.848747Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-11-18T08:02:38.875433Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1206649925159480994] 2024-11-18T08:02:38.876990Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-11-18T08:02:38.877177Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-11-18T08:02:38.877559Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-11-18T08:02:38.878156Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-11-18T08:02:38.878848Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-11-18T08:02:47.900409Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-11-19T08:06:32.272290Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4801735202613986403] 2024-11-19T08:06:32.273906Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-11-19T08:06:32.274083Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-11-19T08:06:32.274426Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-11-19T08:06:32.274965Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-11-19T08:06:32.275467Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-11-19T08:06:41.296536Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-11-20T08:08:53.917189Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3249826550818912] 2024-11-20T08:08:53.926432Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-11-20T08:08:53.926573Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-11-20T08:08:53.926961Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-11-20T08:08:53.927516Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-11-20T08:08:53.928058Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-11-20T08:09:02.945593Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-11-21T08:04:23.018615Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_13971434211689341821] 2024-11-21T08:04:23.020102Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-11-21T08:04:23.020260Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-11-21T08:04:23.020624Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-11-21T08:04:23.021159Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-11-21T08:04:23.021742Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-11-21T08:04:32.047295Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-11-22T08:03:39.339306Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7512595143477644] 2024-11-22T08:03:39.340207Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-11-22T08:03:39.340377Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-11-22T08:03:39.340699Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-11-22T08:03:39.341123Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-11-22T08:03:39.341644Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-11-22T08:03:48.363037Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-11-23T08:08:16.286797Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10427597410833029612] 2024-11-23T08:08:16.288281Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-11-23T08:08:16.288476Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-11-23T08:08:16.288822Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-11-23T08:08:16.294397Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-11-23T08:08:16.294973Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-11-23T08:08:25.310095Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-11-24T08:04:51.846376Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4428449523014729117] 2024-11-24T08:04:51.848198Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-11-24T08:04:51.848372Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-11-24T08:04:51.848775Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-11-24T08:04:51.849404Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-11-24T08:04:51.850011Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-11-24T08:05:00.870703Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-11-25T08:01:19.003057Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_13467759489521036615] 2024-11-25T08:01:19.004922Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-11-25T08:01:19.005062Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-11-25T08:01:19.005635Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-11-25T08:01:19.006289Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-11-25T08:01:19.006857Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-11-25T08:01:28.032695Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-11-26T08:06:06.604625Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4982851250669406062] 2024-11-26T08:06:06.606207Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-11-26T08:06:06.606380Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-11-26T08:06:06.606696Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-11-26T08:06:06.607264Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-11-26T08:06:06.607879Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-11-26T08:06:15.624147Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-11-27T08:04:49.153875Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8902428806378376868] 2024-11-27T08:04:49.155747Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-11-27T08:04:49.155925Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-11-27T08:04:49.156273Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-11-27T08:04:49.156864Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-11-27T08:04:49.157521Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-11-27T08:04:58.175001Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-11-28T08:06:03.432257Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9702354676417373848] 2024-11-28T08:06:03.433235Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-11-28T08:06:03.433384Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-11-28T08:06:03.433729Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-11-28T08:06:03.434247Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-11-28T08:06:03.434788Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-11-28T08:06:12.456411Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-11-29T08:08:20.046437Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_18338674223997930177] 2024-11-29T08:08:20.048128Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-11-29T08:08:20.048300Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-11-29T08:08:20.048640Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-11-29T08:08:20.049142Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-11-29T08:08:20.049722Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-11-29T08:08:29.071533Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-11-30T08:02:53.406916Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2835601860500790394] 2024-11-30T08:02:53.408904Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-11-30T08:02:53.409155Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-11-30T08:02:53.409646Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-11-30T08:02:53.410268Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-11-30T08:02:53.410924Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-11-30T08:03:02.431668Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-12-01T08:05:43.586743Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_18280863178273403040] 2024-12-01T08:05:43.593818Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-12-01T08:05:43.594043Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-12-01T08:05:43.594397Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-12-01T08:05:43.595000Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-12-01T08:05:43.595583Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-12-01T08:05:52.616948Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-12-02T08:02:55.082792Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5565686934020093241] 2024-12-02T08:02:55.088353Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-12-02T08:02:55.088572Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-12-02T08:02:55.088925Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-12-02T08:02:55.089479Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-12-02T08:02:55.091848Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-12-02T08:03:04.114018Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-12-03T08:10:42.031909Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16224623521175913879] 2024-12-03T08:10:42.039955Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-12-03T08:10:42.040167Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-12-03T08:10:42.040509Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-12-03T08:10:42.041155Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-12-03T08:10:42.041715Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-12-03T08:10:51.064712Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-12-04T08:06:51.500628Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_190441306058681958] 2024-12-04T08:06:51.507408Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-12-04T08:06:51.507690Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-12-04T08:06:51.508089Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-12-04T08:06:51.508592Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-12-04T08:06:51.509131Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-12-04T08:07:00.530309Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-12-05T08:03:20.316759Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14974520217010555217] 2024-12-05T08:03:20.318339Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-12-05T08:03:20.318517Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-12-05T08:03:20.318839Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-12-05T08:03:20.319629Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-12-05T08:03:20.320309Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-12-05T08:03:29.346289Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-12-06T08:03:22.889671Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3745379649389342580] 2024-12-06T08:03:22.891229Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-12-06T08:03:22.891384Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-12-06T08:03:22.896897Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-12-06T08:03:22.897415Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-12-06T08:03:22.898059Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-12-06T08:03:31.921328Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-12-07T08:03:27.447698Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9555053264872029145] 2024-12-07T08:03:27.449330Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-12-07T08:03:27.449532Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-12-07T08:03:27.450009Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-12-07T08:03:27.450651Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-12-07T08:03:27.451406Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-12-07T08:03:36.466772Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-12-08T08:05:59.582255Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3561762173135960726] 2024-12-08T08:05:59.583707Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-12-08T08:05:59.583903Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-12-08T08:05:59.584244Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-12-08T08:05:59.584693Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-12-08T08:05:59.585437Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-12-08T08:06:08.608689Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-12-09T08:06:35.145567Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12807276239866474254] 2024-12-09T08:06:35.147079Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-12-09T08:06:35.147263Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-12-09T08:06:35.147567Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-12-09T08:06:35.148556Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-12-09T08:06:35.149323Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-12-09T08:06:44.169828Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-12-10T08:04:00.265289Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16603355118219607221] 2024-12-10T08:04:00.266201Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-12-10T08:04:00.272093Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-12-10T08:04:00.272475Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-12-10T08:04:00.273103Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-12-10T08:04:00.274043Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-12-10T08:04:09.294821Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-12-11T08:02:10.157042Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14718055172244594763] 2024-12-11T08:02:10.158569Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-12-11T08:02:10.158768Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-12-11T08:02:10.159250Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-12-11T08:02:10.159878Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-12-11T08:02:10.160393Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-12-11T08:02:19.181803Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-12-12T08:05:42.527698Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5648477290039012698] 2024-12-12T08:05:42.529424Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-12-12T08:05:42.529717Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-12-12T08:05:42.530094Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-12-12T08:05:42.530623Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-12-12T08:05:42.531232Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-12-12T08:05:51.551935Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-12-13T08:06:41.249738Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4396538531958093881] 2024-12-13T08:06:41.251696Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-12-13T08:06:41.251910Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-12-13T08:06:41.252306Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-12-13T08:06:41.253090Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-12-13T08:06:41.253790Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-12-13T08:06:50.274843Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-12-14T08:08:19.186307Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11916018411230216424] 2024-12-14T08:08:19.188175Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-12-14T08:08:19.188452Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-12-14T08:08:19.188902Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-12-14T08:08:19.189616Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-12-14T08:08:19.190391Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-12-14T08:08:28.214304Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-12-15T08:07:35.854064Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7348461466845868594] 2024-12-15T08:07:35.855502Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-12-15T08:07:35.855676Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-12-15T08:07:35.856034Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-12-15T08:07:35.856446Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-12-15T08:07:35.856940Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-12-15T08:07:44.873453Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-12-16T08:06:29.060634Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12825285441826838766] 2024-12-16T08:06:29.068168Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-12-16T08:06:29.068678Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-12-16T08:06:29.069085Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-12-16T08:06:29.069641Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-12-16T08:06:29.070299Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-12-16T08:06:38.091376Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-12-17T08:08:52.755796Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9817949871503133040] 2024-12-17T08:08:52.772239Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-12-17T08:08:52.772424Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-12-17T08:08:52.772765Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-12-17T08:08:52.773237Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-12-17T08:08:52.773827Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-12-17T08:09:01.799272Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-12-18T08:03:34.341709Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11606558630465939632] 2024-12-18T08:03:34.342852Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-12-18T08:03:34.343066Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-12-18T08:03:34.343441Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-12-18T08:03:34.343955Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-12-18T08:03:34.344876Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-12-18T08:03:43.366375Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-12-19T02:09:27.099091Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11606558630465939632] 2024-12-19T02:09:27.107444Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-12-19T02:09:27.108124Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-12-19T02:09:27.115619Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-12-19T02:09:27.117016Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-12-19T02:09:27.117966Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-12-19T02:09:36.148471Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-12-19T08:09:24.156177Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9126921150580063044] 2024-12-19T08:09:24.157134Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-12-19T08:09:24.157298Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-12-19T08:09:24.157640Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-12-19T08:09:24.158114Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-12-19T08:09:24.158677Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-12-19T08:09:33.180533Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-12-20T08:09:40.866894Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8210278378305466233] 2024-12-20T08:09:40.873258Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-12-20T08:09:40.873444Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-12-20T08:09:40.874033Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-12-20T08:09:40.874655Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-12-20T08:09:40.875464Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-12-20T08:09:49.896447Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-12-21T08:08:05.635830Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6043158056625163216] 2024-12-21T08:08:05.636862Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-12-21T08:08:05.642871Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-12-21T08:08:05.644032Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-12-21T08:08:05.644627Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-12-21T08:08:05.645184Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-12-21T08:08:14.660527Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-12-22T08:05:51.375072Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15814391627972072755] 2024-12-22T08:05:51.377242Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-12-22T08:05:51.377484Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-12-22T08:05:51.377907Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-12-22T08:05:51.383143Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-12-22T08:05:51.383781Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-12-22T08:06:00.399362Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-12-23T08:05:11.718963Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10237244866286506491] 2024-12-23T08:05:11.720604Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-12-23T08:05:11.720854Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-12-23T08:05:11.721217Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-12-23T08:05:11.721789Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-12-23T08:05:11.722402Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-12-23T08:05:20.738914Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-12-24T08:07:52.540600Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11946358831412027561] 2024-12-24T08:07:52.541706Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-12-24T08:07:52.541983Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-12-24T08:07:52.542454Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-12-24T08:07:52.542990Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-12-24T08:07:52.543614Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-12-24T08:08:01.564577Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-12-25T08:07:51.569379Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10647540023605331777] 2024-12-25T08:07:51.576259Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-12-25T08:07:51.576477Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-12-25T08:07:51.576900Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-12-25T08:07:51.577504Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-12-25T08:07:51.578131Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-12-25T08:08:00.596753Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-12-26T08:09:07.787362Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7349824783655270052] 2024-12-26T08:09:07.788492Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-12-26T08:09:07.788688Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-12-26T08:09:07.788995Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-12-26T08:09:07.789548Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-12-26T08:09:07.790297Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-12-26T08:09:16.811118Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-12-27T08:07:03.652227Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_898186253809437117] 2024-12-27T08:07:03.653073Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-12-27T08:07:03.653358Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-12-27T08:07:03.653715Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-12-27T08:07:03.654224Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-12-27T08:07:03.655000Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-12-27T08:07:12.675578Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-12-28T08:06:18.966080Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2751275011297467410] 2024-12-28T08:06:18.968246Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-12-28T08:06:18.968450Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-12-28T08:06:18.968850Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-12-28T08:06:18.969453Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-12-28T08:06:18.970146Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-12-28T08:06:27.991324Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-12-29T08:10:06.035912Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10225477009979198668] 2024-12-29T08:10:06.037635Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-12-29T08:10:06.037832Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-12-29T08:10:06.038182Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-12-29T08:10:06.038892Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-12-29T08:10:06.039506Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-12-29T08:10:15.056814Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-12-30T08:08:40.146376Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3773435889076835981] 2024-12-30T08:08:40.152879Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-12-30T08:08:40.153200Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-12-30T08:08:40.153603Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-12-30T08:08:40.154104Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-12-30T08:08:40.154775Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-12-30T08:08:49.172168Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2024-12-31T08:07:28.270269Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15388768510686062384] 2024-12-31T08:07:28.271098Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2024-12-31T08:07:28.271330Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2024-12-31T08:07:28.277361Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2024-12-31T08:07:28.278124Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2024-12-31T08:07:28.278725Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2024-12-31T08:07:37.293363Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-01-01T08:02:04.694702Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17345277844318731395] 2025-01-01T08:02:04.695633Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-01-01T08:02:04.695835Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-01-01T08:02:04.699009Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-01-01T08:02:04.699557Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-01-01T08:02:04.703460Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-01-01T08:02:13.719056Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-01-02T08:07:35.388121Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6178605211452587054] 2025-01-02T08:07:35.388951Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-01-02T08:07:35.389181Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-01-02T08:07:35.389484Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-01-02T08:07:35.389942Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-01-02T08:07:35.390801Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-01-02T08:07:44.412730Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-01-03T08:10:39.913450Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14070303532357842701] 2025-01-03T08:10:39.915410Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-01-03T08:10:39.921206Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-01-03T08:10:39.921543Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-01-03T08:10:39.922008Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-01-03T08:10:39.922521Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-01-03T08:10:48.948659Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-01-04T08:03:36.169993Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8958919476022863410] 2025-01-04T08:03:36.172053Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-01-04T08:03:36.172326Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-01-04T08:03:36.172631Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-01-04T08:03:36.173242Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-01-04T08:03:36.174125Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-01-04T08:03:45.193801Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-01-05T08:03:00.250054Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5156831156270488614] 2025-01-05T08:03:00.252264Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-01-05T08:03:00.252442Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-01-05T08:03:00.253267Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-01-05T08:03:00.253994Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-01-05T08:03:00.254633Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-01-05T08:03:09.272240Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-01-06T08:02:42.662635Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10671309902796682380] 2025-01-06T08:02:42.663597Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-01-06T08:02:42.663859Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-01-06T08:02:42.664324Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-01-06T08:02:42.665005Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-01-06T08:02:42.671221Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-01-06T08:02:51.686295Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-01-07T08:08:59.102563Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3352290922044211641] 2025-01-07T08:08:59.103704Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-01-07T08:08:59.103893Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-01-07T08:08:59.104337Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-01-07T08:08:59.104889Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-01-07T08:08:59.105583Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-01-07T08:09:08.129599Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-01-08T08:09:19.689699Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10076548531124011238] 2025-01-08T08:09:19.690670Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-01-08T08:09:19.690870Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-01-08T08:09:19.691289Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-01-08T08:09:19.691880Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-01-08T08:09:19.692530Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-01-08T08:09:28.714398Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-01-09T08:03:50.990778Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_13414583943756714859] 2025-01-09T08:03:50.992411Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-01-09T08:03:50.992575Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-01-09T08:03:50.992881Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-01-09T08:03:50.998542Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-01-09T08:03:50.999259Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-01-09T08:04:00.015587Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-01-10T08:06:40.524818Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6600170035853483053] 2025-01-10T08:06:40.526836Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-01-10T08:06:40.527031Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-01-10T08:06:40.527462Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-01-10T08:06:40.528196Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-01-10T08:06:40.528849Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-01-10T08:06:49.550576Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-01-11T08:06:32.684805Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_470395973955169638] 2025-01-11T08:06:32.686386Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-01-11T08:06:32.686541Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-01-11T08:06:32.686912Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-01-11T08:06:32.687423Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-01-11T08:06:32.687970Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-01-11T08:06:41.704452Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-01-12T08:06:20.451298Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8655375660893500948] 2025-01-12T08:06:20.453061Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-01-12T08:06:20.453257Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-01-12T08:06:20.453637Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-01-12T08:06:20.454131Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-01-12T08:06:20.454717Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-01-12T08:06:29.470388Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-01-13T08:08:44.089972Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11825282343294375235] 2025-01-13T08:08:44.091009Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-01-13T08:08:44.091170Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-01-13T08:08:44.097253Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-01-13T08:08:44.097952Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-01-13T08:08:44.098601Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-01-13T08:08:53.126026Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-01-14T08:09:42.396825Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7577541075280059018] 2025-01-14T08:09:42.397719Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-01-14T08:09:42.397988Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-01-14T08:09:42.398392Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-01-14T08:09:42.398869Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-01-14T08:09:42.399598Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-01-14T08:09:51.418985Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-01-15T08:05:39.719601Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9268336995083929016] 2025-01-15T08:05:39.721035Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-01-15T08:05:39.721223Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-01-15T08:05:39.721703Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-01-15T08:05:39.722166Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-01-15T08:05:39.722782Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-01-15T08:05:48.744234Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-01-16T08:06:54.813188Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9589187963729688919] 2025-01-16T08:06:54.814893Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-01-16T08:06:54.815045Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-01-16T08:06:54.815350Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-01-16T08:06:54.815991Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-01-16T08:06:54.816938Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-01-16T08:07:03.837330Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-01-17T08:09:40.405655Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7006485421055763841] 2025-01-17T08:09:40.406691Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-01-17T08:09:40.406892Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-01-17T08:09:40.407855Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-01-17T08:09:40.408537Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-01-17T08:09:40.409313Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-01-17T08:09:49.430252Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-01-18T08:10:05.680318Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5761816645549418898] 2025-01-18T08:10:05.681994Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-01-18T08:10:05.682169Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-01-18T08:10:05.682608Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-01-18T08:10:05.683211Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-01-18T08:10:05.683940Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-01-18T08:10:14.704613Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-01-19T08:07:33.968984Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15726640388720430764] 2025-01-19T08:07:33.969859Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-01-19T08:07:33.970013Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-01-19T08:07:33.975962Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-01-19T08:07:33.976533Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-01-19T08:07:33.977061Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-01-19T08:07:42.991915Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-01-20T08:03:58.713812Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15455665091085491947] 2025-01-20T08:03:58.714899Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-01-20T08:03:58.715077Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-01-20T08:03:58.715429Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-01-20T08:03:58.715903Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-01-20T08:03:58.716421Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-01-20T08:04:07.736223Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-01-21T08:04:28.570039Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_18292344024302865839] 2025-01-21T08:04:28.570962Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-01-21T08:04:28.571157Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-01-21T08:04:28.571487Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-01-21T08:04:28.571951Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-01-21T08:04:28.572520Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-01-21T08:04:37.594439Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-01-22T08:01:59.822431Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16958961652807621485] 2025-01-22T08:01:59.823545Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-01-22T08:01:59.823695Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-01-22T08:01:59.824090Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-01-22T08:01:59.830125Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-01-22T08:01:59.830700Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-01-22T08:02:08.846489Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-01-23T08:02:21.314649Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16311157436003231540] 2025-01-23T08:02:21.320873Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-01-23T08:02:21.321061Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-01-23T08:02:21.321587Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-01-23T08:02:21.322323Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-01-23T08:02:21.322926Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-01-23T08:02:30.348859Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-01-24T08:04:12.103044Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17098545644020745582] 2025-01-24T08:04:12.103987Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-01-24T08:04:12.104156Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-01-24T08:04:12.104615Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-01-24T08:04:12.105068Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-01-24T08:04:12.111247Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-01-24T08:04:21.127337Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-01-25T08:01:39.309988Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2489366103250977369] 2025-01-25T08:01:39.310811Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-01-25T08:01:39.310957Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-01-25T08:01:39.311287Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-01-25T08:01:39.311788Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-01-25T08:01:39.312319Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-01-25T08:01:48.333421Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-01-26T08:03:10.296858Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1703727325170310380] 2025-01-26T08:03:10.297550Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-01-26T08:03:10.297692Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-01-26T08:03:10.298029Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-01-26T08:03:10.298526Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-01-26T08:03:10.299049Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-01-26T08:03:19.320672Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-01-27T08:06:59.613526Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10449267121728936876] 2025-01-27T08:06:59.615213Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-01-27T08:06:59.615390Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-01-27T08:06:59.615806Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-01-27T08:06:59.616333Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-01-27T08:06:59.616828Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-01-27T08:07:08.636462Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-01-28T08:07:12.250743Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12917908227089228051] 2025-01-28T08:07:12.252114Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-01-28T08:07:12.252282Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-01-28T08:07:12.252654Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-01-28T08:07:12.253148Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-01-28T08:07:12.253678Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-01-28T08:07:21.278424Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-01-29T08:04:27.448068Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1665790298468457653] 2025-01-29T08:04:27.448923Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-01-29T08:04:27.449132Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-01-29T08:04:27.449477Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-01-29T08:04:27.449996Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-01-29T08:04:27.456320Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-01-29T08:04:36.475692Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-01-30T08:02:22.402557Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8693459014955224204] 2025-01-30T08:02:22.409171Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-01-30T08:02:22.409400Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-01-30T08:02:22.409763Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-01-30T08:02:22.410352Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-01-30T08:02:22.410957Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-01-30T08:02:31.432911Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-01-31T08:01:18.269790Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16202391223797643261] 2025-01-31T08:01:18.271623Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-01-31T08:01:18.271862Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-01-31T08:01:18.272223Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-01-31T08:01:18.272847Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-01-31T08:01:18.273573Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-01-31T08:01:27.294668Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-02-01T08:05:57.756193Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16855160128719843148] 2025-02-01T08:05:57.762894Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-02-01T08:05:57.763116Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-02-01T08:05:57.763512Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-02-01T08:05:57.764218Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-02-01T08:05:57.764854Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-02-01T08:06:06.784304Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-02-02T08:01:38.018768Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17116401476023023279] 2025-02-02T08:01:38.019670Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-02-02T08:01:38.019827Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-02-02T08:01:38.020249Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-02-02T08:01:38.020717Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-02-02T08:01:38.021446Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-02-02T08:01:47.042638Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-02-03T08:08:33.199605Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12542866091442942363] 2025-02-03T08:08:33.201115Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-02-03T08:08:33.201273Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-02-03T08:08:33.201661Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-02-03T08:08:33.202336Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-02-03T08:08:33.203190Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-02-03T08:08:42.223218Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-02-04T08:05:02.191691Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14224194460915492386] 2025-02-04T08:05:02.194890Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-02-04T08:05:02.195045Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-02-04T08:05:02.195371Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-02-04T08:05:02.195818Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-02-04T08:05:02.196362Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-02-04T08:05:11.214461Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-02-05T08:07:41.913276Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_18069164803743690348] 2025-02-05T08:07:41.919574Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-02-05T08:07:41.919788Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-02-05T08:07:41.920263Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-02-05T08:07:41.920814Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-02-05T08:07:41.921536Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-02-05T08:07:50.943261Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-02-06T08:06:22.430772Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11389615909544629479] 2025-02-06T08:06:22.431864Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-02-06T08:06:22.432100Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-02-06T08:06:22.432679Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-02-06T08:06:22.433309Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-02-06T08:06:22.439502Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-02-06T08:06:31.453428Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-02-07T08:08:30.481354Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8349387352919150489] 2025-02-07T08:08:30.482101Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-02-07T08:08:30.487963Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-02-07T08:08:30.488473Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-02-07T08:08:30.488902Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-02-07T08:08:30.489473Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-02-07T08:08:39.504195Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-02-08T08:06:40.480314Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10337630890547366834] 2025-02-08T08:06:40.486757Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-02-08T08:06:40.486975Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-02-08T08:06:40.487358Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-02-08T08:06:40.487905Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-02-08T08:06:40.488594Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-02-08T08:06:49.507164Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-02-09T08:02:35.729484Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7014835980633176221] 2025-02-09T08:02:35.735863Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-02-09T08:02:35.736039Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-02-09T08:02:35.736449Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-02-09T08:02:35.737165Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-02-09T08:02:35.737867Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-02-09T08:02:44.757456Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-02-10T08:01:15.686742Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12070774698294350430] 2025-02-10T08:01:15.693184Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-02-10T08:01:15.693330Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-02-10T08:01:15.693808Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-02-10T08:01:15.694482Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-02-10T08:01:15.695370Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-02-10T08:01:24.717198Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-02-11T08:04:46.551383Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12022996245543761477] 2025-02-11T08:04:46.552462Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-02-11T08:04:46.558355Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-02-11T08:04:46.558832Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-02-11T08:04:46.559386Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-02-11T08:04:46.560049Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-02-11T08:04:55.579076Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-02-12T08:03:15.834736Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16497282694250231839] 2025-02-12T08:03:15.836381Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-02-12T08:03:15.836526Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-02-12T08:03:15.836944Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-02-12T08:03:15.837410Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-02-12T08:03:15.838044Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-02-12T08:03:24.857679Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-02-13T08:02:32.944368Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7992431026020249188] 2025-02-13T08:02:32.951117Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-02-13T08:02:32.951264Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-02-13T08:02:32.951621Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-02-13T08:02:32.952223Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-02-13T08:02:32.952749Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-02-13T08:02:41.976781Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-02-14T08:07:10.928248Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10872175576176721082] 2025-02-14T08:07:10.934667Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-02-14T08:07:10.934952Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-02-14T08:07:10.935442Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-02-14T08:07:10.935935Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-02-14T08:07:10.936607Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-02-14T08:07:19.964290Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-02-15T08:05:21.208860Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4272138796199283936] 2025-02-15T08:05:21.215627Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-02-15T08:05:21.215929Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-02-15T08:05:21.217376Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-02-15T08:05:21.217867Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-02-15T08:05:21.218435Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-02-15T08:05:30.240550Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-02-16T08:01:47.849058Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15338975374206700573] 2025-02-16T08:01:47.850732Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-02-16T08:01:47.850929Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-02-16T08:01:47.851394Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-02-16T08:01:47.851963Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-02-16T08:01:47.852698Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-02-16T08:01:56.874006Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-02-17T08:06:07.971174Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4196203838774349752] 2025-02-17T08:06:07.971960Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-02-17T08:06:07.972161Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-02-17T08:06:07.972514Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-02-17T08:06:07.978975Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-02-17T08:06:07.979655Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-02-17T08:06:16.994957Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-02-18T08:09:54.760164Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12624440264437591210] 2025-02-18T08:09:54.762039Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-02-18T08:09:54.762207Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-02-18T08:09:54.762552Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-02-18T08:09:54.763110Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-02-18T08:09:54.763709Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-02-18T08:10:03.787635Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-02-19T08:03:25.419945Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3053990725989304431] 2025-02-19T08:03:25.426842Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-02-19T08:03:25.427052Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-02-19T08:03:25.427564Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-02-19T08:03:25.428220Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-02-19T08:03:25.428829Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-02-19T08:03:34.449785Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-02-20T08:08:25.774369Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12773066569953799221] 2025-02-20T08:08:25.775239Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-02-20T08:08:25.775431Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-02-20T08:08:25.775802Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-02-20T08:08:25.782010Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-02-20T08:08:25.782644Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-02-20T08:08:34.797882Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-02-21T08:07:26.394719Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9666614161189573635] 2025-02-21T08:07:26.401467Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-02-21T08:07:26.401706Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-02-21T08:07:26.402221Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-02-21T08:07:26.402799Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-02-21T08:07:26.403333Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-02-21T08:07:35.423621Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-02-22T08:10:01.959039Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17371091368332888754] 2025-02-22T08:10:01.959940Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-02-22T08:10:01.965735Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-02-22T08:10:01.966228Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-02-22T08:10:01.966817Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-02-22T08:10:01.967455Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-02-22T08:10:10.985227Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-02-23T08:07:39.312738Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17654320468122446904] 2025-02-23T08:07:39.313412Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-02-23T08:07:39.313539Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-02-23T08:07:39.313818Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-02-23T08:07:39.314299Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-02-23T08:07:39.314753Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-02-23T08:07:48.337580Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-02-24T08:04:15.065723Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3557170725327835599] 2025-02-24T08:04:15.067541Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-02-24T08:04:15.067727Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-02-24T08:04:15.068092Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-02-24T08:04:15.068706Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-02-24T08:04:15.069317Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-02-24T08:04:24.087838Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-02-25T08:06:29.348008Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2108596948797641261] 2025-02-25T08:06:29.355099Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-02-25T08:06:29.355298Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-02-25T08:06:29.355689Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-02-25T08:06:29.356213Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-02-25T08:06:29.357031Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-02-25T08:06:38.379250Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-02-26T08:03:11.305907Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10074158712184701368] 2025-02-26T08:03:11.307656Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-02-26T08:03:11.307897Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-02-26T08:03:11.308339Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-02-26T08:03:11.308861Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-02-26T08:03:11.309393Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-02-26T08:03:20.330698Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-02-27T08:06:07.825061Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16729777845466916412] 2025-02-27T08:06:07.826863Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-02-27T08:06:07.827038Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-02-27T08:06:07.827376Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-02-27T08:06:07.827930Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-02-27T08:06:07.828471Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-02-27T08:06:16.850558Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-02-28T08:06:49.567417Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7771201723686023232] 2025-02-28T08:06:49.568407Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-02-28T08:06:49.568665Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-02-28T08:06:49.569096Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-02-28T08:06:49.569559Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-02-28T08:06:49.575841Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-02-28T08:06:58.591500Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-03-01T08:01:16.816997Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1942155883256103513] 2025-03-01T08:01:16.818516Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-03-01T08:01:16.818685Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-03-01T08:01:16.819084Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-03-01T08:01:16.819663Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-03-01T08:01:16.820261Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-03-01T08:01:25.841094Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-03-02T08:05:17.729855Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8372762764741708980] 2025-03-02T08:05:17.737063Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-03-02T08:05:17.737231Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-03-02T08:05:17.737575Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-03-02T08:05:17.738300Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-03-02T08:05:17.738848Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-03-02T08:05:26.760235Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-03-03T08:06:05.213230Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4965493291544616274] 2025-03-03T08:06:05.215273Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-03-03T08:06:05.215454Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-03-03T08:06:05.215831Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-03-03T08:06:05.216354Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-03-03T08:06:05.217093Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-03-03T08:06:14.233255Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-03-04T08:02:40.218230Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2977217181854090119] 2025-03-04T08:02:40.219016Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-03-04T08:02:40.224919Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-03-04T08:02:40.225333Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-03-04T08:02:40.225872Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-03-04T08:02:40.226561Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-03-04T08:02:49.242165Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-03-05T08:02:08.436218Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12985653153297227374] 2025-03-05T08:02:08.438486Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-03-05T08:02:08.438699Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-03-05T08:02:08.439071Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-03-05T08:02:08.439574Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-03-05T08:02:08.440123Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-03-05T08:02:17.458560Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-03-06T08:10:12.706164Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10048441979397307431] 2025-03-06T08:10:12.712672Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-03-06T08:10:12.712878Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-03-06T08:10:12.713233Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-03-06T08:10:12.713759Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-03-06T08:10:12.714253Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-03-06T08:10:21.734512Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-03-07T08:08:54.020002Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14240114612378498603] 2025-03-07T08:08:54.026621Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-03-07T08:08:54.026794Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-03-07T08:08:54.027282Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-03-07T08:08:54.027822Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-03-07T08:08:54.028458Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-03-07T08:09:03.056845Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-03-08T08:07:15.231369Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8355884723396031552] 2025-03-08T08:07:15.233053Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-03-08T08:07:15.233253Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-03-08T08:07:15.233659Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-03-08T08:07:15.234160Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-03-08T08:07:15.240020Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-03-08T08:07:24.255381Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-03-09T08:05:38.328373Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11205109802663583705] 2025-03-09T08:05:38.330089Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-03-09T08:05:38.330251Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-03-09T08:05:38.335676Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-03-09T08:05:38.336235Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-03-09T08:05:38.336888Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-03-09T08:05:47.355816Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-03-10T08:05:35.679258Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6572839579873598944] 2025-03-10T08:05:35.685822Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-03-10T08:05:35.685980Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-03-10T08:05:35.686360Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-03-10T08:05:35.686872Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-03-10T08:05:35.687453Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-03-10T08:05:44.708654Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-03-10T22:52:19.897715Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15903213922544216982] 2025-03-10T22:52:19.903385Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-03-10T22:52:19.903513Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-03-10T22:52:19.903782Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-03-10T22:52:19.904150Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-03-10T22:52:19.904679Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-03-10T22:52:28.923014Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-03-11T08:02:52.861533Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9397237879226068661] 2025-03-11T08:02:52.862261Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-03-11T08:02:52.862450Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-03-11T08:02:52.868198Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-03-11T08:02:52.868726Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-03-11T08:02:52.869242Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-03-11T08:03:01.884895Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-03-12T08:08:48.911736Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3883290671298762714] 2025-03-12T08:08:48.913632Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-03-12T08:08:48.913821Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-03-12T08:08:48.914216Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-03-12T08:08:48.914722Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-03-12T08:08:48.915256Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-03-12T08:08:57.936212Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-03-13T08:01:03.979752Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2408540649646887201] 2025-03-13T08:01:03.981645Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-03-13T08:01:03.981840Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-03-13T08:01:03.982223Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-03-13T08:01:03.982838Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-03-13T08:01:03.983457Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-03-13T08:01:13.003928Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-03-14T08:06:15.140189Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_13063492151318339158] 2025-03-14T08:06:15.142535Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-03-14T08:06:15.143395Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-03-14T08:06:15.143937Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-03-14T08:06:15.144469Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-03-14T08:06:15.148963Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-03-14T08:06:24.164205Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-03-15T08:04:07.849512Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10857121916401440532] 2025-03-15T08:04:07.850435Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-03-15T08:04:07.850599Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-03-15T08:04:07.851371Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-03-15T08:04:07.851882Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-03-15T08:04:07.852508Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-03-15T08:04:16.873212Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-03-16T08:09:24.084667Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_2] 2025-03-16T08:09:24.086556Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-03-16T08:09:24.086741Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-03-16T08:09:24.087107Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-03-16T08:09:24.087788Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-03-16T08:09:24.088877Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-03-16T08:09:33.104583Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-03-17T08:01:40.826379Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12362597326220672965] 2025-03-17T08:01:40.827298Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-03-17T08:01:40.827575Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-03-17T08:01:40.833590Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-03-17T08:01:40.834292Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-03-17T08:01:40.834900Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-03-17T08:01:49.850204Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-03-18T08:09:01.357140Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16678226845108244] 2025-03-18T08:09:01.363620Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-03-18T08:09:01.363789Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-03-18T08:09:01.364156Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-03-18T08:09:01.364682Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-03-18T08:09:01.365257Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-03-18T08:09:10.386824Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-03-19T08:02:39.957469Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6700536769486835877] 2025-03-19T08:02:39.965628Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-03-19T08:02:39.965904Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-03-19T08:02:39.966311Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-03-19T08:02:39.966975Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-03-19T08:02:39.967606Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-03-19T08:02:48.987734Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-03-20T08:02:04.436919Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5426082697645772566] 2025-03-20T08:02:04.438707Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-03-20T08:02:04.438889Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-03-20T08:02:04.439315Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-03-20T08:02:04.439936Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-03-20T08:02:04.440711Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-03-20T08:02:13.456217Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-03-21T08:03:19.134614Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2781358275525065978] 2025-03-21T08:03:19.140568Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-03-21T08:03:19.140786Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-03-21T08:03:19.141157Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-03-21T08:03:19.141665Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-03-21T08:03:19.142555Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-03-21T08:03:28.163627Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-03-22T08:03:06.780111Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3096585014178622224] 2025-03-22T08:03:06.787005Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-03-22T08:03:06.787197Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-03-22T08:03:06.787648Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-03-22T08:03:06.788287Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-03-22T08:03:06.788942Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-03-22T08:03:15.803906Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-03-23T08:07:18.118403Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16064792409237864524] 2025-03-23T08:07:18.119437Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-03-23T08:07:18.119678Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-03-23T08:07:18.120069Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-03-23T08:07:18.120676Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-03-23T08:07:18.126768Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-03-23T08:07:27.143210Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-03-24T08:08:03.694202Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12481355923475970267] 2025-03-24T08:08:03.695216Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-03-24T08:08:03.695405Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-03-24T08:08:03.695857Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-03-24T08:08:03.696359Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-03-24T08:08:03.702478Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-03-24T08:08:12.722072Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-03-25T08:00:45.119270Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4633741179202119908] 2025-03-25T08:00:45.122203Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-03-25T08:00:45.122357Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-03-25T08:00:45.122721Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-03-25T08:00:45.123190Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-03-25T08:00:45.123797Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-03-25T08:00:54.141295Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-03-26T08:01:16.343015Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5268023773477115822] 2025-03-26T08:01:16.344715Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-03-26T08:01:16.344894Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-03-26T08:01:16.345297Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-03-26T08:01:16.345863Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-03-26T08:01:16.346655Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-03-26T08:01:25.367394Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-03-27T08:06:20.643019Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14312724322893156058] 2025-03-27T08:06:20.644661Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-03-27T08:06:20.644868Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-03-27T08:06:20.645229Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-03-27T08:06:20.645740Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-03-27T08:06:20.651308Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-03-27T08:06:29.666888Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-03-28T08:07:20.407433Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14078330329312162338] 2025-03-28T08:07:20.408450Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-03-28T08:07:20.408617Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-03-28T08:07:20.408993Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-03-28T08:07:20.409616Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-03-28T08:07:20.415427Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-03-28T08:07:29.431378Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-03-29T08:03:56.967386Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12457870723285645438] 2025-03-29T08:03:56.968658Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-03-29T08:03:56.968818Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-03-29T08:03:56.969273Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-03-29T08:03:56.975192Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-03-29T08:03:56.975983Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-03-29T08:04:05.991710Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-03-30T08:07:28.489588Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10301687446141738263] 2025-03-30T08:07:28.490535Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-03-30T08:07:28.490708Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-03-30T08:07:28.491218Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-03-30T08:07:28.491748Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-03-30T08:07:28.492921Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-03-30T08:07:37.513154Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-03-31T08:06:08.865716Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9679572687168106683] 2025-03-31T08:06:08.867422Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-03-31T08:06:08.867726Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-03-31T08:06:08.868144Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-03-31T08:06:08.869320Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-03-31T08:06:08.870012Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-03-31T08:06:17.889693Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-04-01T08:03:54.878711Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_13057164236033039451] 2025-04-01T08:03:54.880328Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-04-01T08:03:54.880531Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-04-01T08:03:54.880991Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-04-01T08:03:54.881800Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-04-01T08:03:54.887382Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-04-01T08:04:03.903353Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-04-02T08:03:32.080132Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11402296508818327753] 2025-04-02T08:03:32.081136Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-04-02T08:03:32.081287Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-04-02T08:03:32.081689Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-04-02T08:03:32.082207Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-04-02T08:03:32.082835Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-04-02T08:03:41.104487Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-04-03T08:01:42.074925Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6141978106592619587] 2025-04-03T08:01:42.075723Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-04-03T08:01:42.075876Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-04-03T08:01:42.076224Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-04-03T08:01:42.076679Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-04-03T08:01:42.077539Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-04-03T08:01:51.098605Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-04-04T08:02:07.591410Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5113011445944018551] 2025-04-04T08:02:07.592979Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-04-04T08:02:07.593134Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-04-04T08:02:07.593462Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-04-04T08:02:07.594043Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-04-04T08:02:07.594735Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-04-04T08:02:16.612152Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-04-05T08:06:36.181400Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10968699556930119077] 2025-04-05T08:06:36.187994Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-04-05T08:06:36.188144Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-04-05T08:06:36.188459Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-04-05T08:06:36.188947Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-04-05T08:06:36.189450Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-04-05T08:06:45.203701Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-04-06T08:07:33.822420Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16337931606769974512] 2025-04-06T08:07:33.827917Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-04-06T08:07:33.828189Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-04-06T08:07:33.828591Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-04-06T08:07:33.829112Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-04-06T08:07:33.829748Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-04-06T08:07:42.850390Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-04-07T08:02:58.732538Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9258847802028168633] 2025-04-07T08:02:58.734233Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-04-07T08:02:58.734452Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-04-07T08:02:58.734828Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-04-07T08:02:58.735478Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-04-07T08:02:58.736135Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-04-07T08:03:07.753157Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-04-08T08:09:21.050080Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14012591055313080717] 2025-04-08T08:09:21.051010Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-04-08T08:09:21.051137Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-04-08T08:09:21.051435Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-04-08T08:09:21.052107Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-04-08T08:09:21.057952Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-04-08T08:09:30.073137Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-04-09T08:01:12.834042Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8261324131256010852] 2025-04-09T08:01:12.834917Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-04-09T08:01:12.835104Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-04-09T08:01:12.835544Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-04-09T08:01:12.836068Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-04-09T08:01:12.836961Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-04-09T08:01:21.858013Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-04-10T08:01:05.541446Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2428130849090015774] 2025-04-10T08:01:05.543144Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-04-10T08:01:05.543360Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-04-10T08:01:05.543715Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-04-10T08:01:05.544269Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-04-10T08:01:05.544879Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-04-10T08:01:14.566093Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-04-11T08:04:24.694492Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10504771816428890842] 2025-04-11T08:04:24.695451Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-04-11T08:04:24.695647Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-04-11T08:04:24.702119Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-04-11T08:04:24.702687Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-04-11T08:04:24.703270Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-04-11T08:04:33.718442Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-04-12T08:02:22.761016Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_938036017519557372] 2025-04-12T08:02:22.762385Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-04-12T08:02:22.762818Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-04-12T08:02:22.763116Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-04-12T08:02:22.768186Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-04-12T08:02:22.769488Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-04-12T08:02:31.797550Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-04-13T08:09:04.370356Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11490915146131952679] 2025-04-13T08:09:04.372075Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-04-13T08:09:04.372213Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-04-13T08:09:04.372753Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-04-13T08:09:04.373277Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-04-13T08:09:04.373756Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-04-13T08:09:13.393470Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-04-14T08:02:27.235997Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6551623638636311353] 2025-04-14T08:02:27.242688Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-04-14T08:02:27.242898Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-04-14T08:02:27.243428Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-04-14T08:02:27.243931Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-04-14T08:02:27.244646Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-04-14T08:02:36.265390Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-04-15T08:07:18.248912Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4306019456222774859] 2025-04-15T08:07:18.255474Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-04-15T08:07:18.255752Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-04-15T08:07:18.256139Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-04-15T08:07:18.256945Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-04-15T08:07:18.257610Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-04-15T08:07:27.280270Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-04-16T08:03:31.863049Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14121216577146693089] 2025-04-16T08:03:31.864777Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-04-16T08:03:31.864958Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-04-16T08:03:31.865330Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-04-16T08:03:31.865918Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-04-16T08:03:31.866510Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-04-16T08:03:40.883057Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-04-17T08:01:43.903057Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6051695547601036889] 2025-04-17T08:01:43.904737Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-04-17T08:01:43.904883Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-04-17T08:01:43.905195Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-04-17T08:01:43.905650Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-04-17T08:01:43.906171Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-04-17T08:01:52.925894Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-04-18T08:10:09.160619Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3809166151219008890] 2025-04-18T08:10:09.163345Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-04-18T08:10:09.163512Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-04-18T08:10:09.168050Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-04-18T08:10:09.168559Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-04-18T08:10:09.169173Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-04-18T08:10:18.184792Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-04-19T08:07:24.859896Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7910825696766097615] 2025-04-19T08:07:24.861146Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-04-19T08:07:24.861340Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-04-19T08:07:24.861795Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-04-19T08:07:24.862518Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-04-19T08:07:24.863150Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-04-19T08:07:33.882553Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-04-20T08:09:57.545668Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10839529414177230515] 2025-04-20T08:09:57.547447Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-04-20T08:09:57.547652Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-04-20T08:09:57.548004Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-04-20T08:09:57.548671Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-04-20T08:09:57.549255Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-04-20T08:10:06.563590Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-04-21T08:09:31.291326Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1840020382611588196] 2025-04-21T08:09:31.292155Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-04-21T08:09:31.292313Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-04-21T08:09:31.292643Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-04-21T08:09:31.293320Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-04-21T08:09:31.294023Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-04-21T08:09:40.316752Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-04-22T08:07:46.093780Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11835260793787629053] 2025-04-22T08:07:46.095699Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-04-22T08:07:46.095902Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-04-22T08:07:46.096314Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-04-22T08:07:46.096988Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-04-22T08:07:46.097625Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-04-22T08:07:55.118418Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-04-23T08:01:31.432661Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8920581068011216262] 2025-04-23T08:01:31.433591Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-04-23T08:01:31.433747Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-04-23T08:01:31.434114Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-04-23T08:01:31.440380Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-04-23T08:01:31.441011Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-04-23T08:01:40.459370Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-04-24T08:05:54.301216Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7518188145061190355] 2025-04-24T08:05:54.303439Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-04-24T08:05:54.303627Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-04-24T08:05:54.304032Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-04-24T08:05:54.304748Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-04-24T08:05:54.305447Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-04-24T08:06:03.326672Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-04-25T08:08:10.890174Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17123531325194998156] 2025-04-25T08:08:10.891845Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-04-25T08:08:10.892045Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-04-25T08:08:10.892452Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-04-25T08:08:10.892931Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-04-25T08:08:10.899566Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-04-25T08:08:19.925890Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-04-26T08:07:59.264137Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10763899574847201694] 2025-04-26T08:07:59.266034Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-04-26T08:07:59.266184Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-04-26T08:07:59.266508Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-04-26T08:07:59.266908Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-04-26T08:07:59.271830Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-04-26T08:08:08.287532Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-04-27T08:01:56.781771Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6670640187910702349] 2025-04-27T08:01:56.782546Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-04-27T08:01:56.782693Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-04-27T08:01:56.783010Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-04-27T08:01:56.783622Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-04-27T08:01:56.784143Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-04-27T08:02:05.804028Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-04-28T08:04:33.117156Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8292212135047559638] 2025-04-28T08:04:33.122642Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-04-28T08:04:33.123002Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-04-28T08:04:33.123388Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-04-28T08:04:33.124122Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-04-28T08:04:33.124777Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-04-28T08:04:42.152467Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-04-29T08:04:18.635023Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5317991198748055848] 2025-04-29T08:04:18.636709Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-04-29T08:04:18.636895Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-04-29T08:04:18.637273Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-04-29T08:04:18.637762Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-04-29T08:04:18.638296Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-04-29T08:04:27.657534Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-04-30T08:03:32.939392Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10412405663021217679] 2025-04-30T08:03:32.940947Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-04-30T08:03:32.941126Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-04-30T08:03:32.941476Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-04-30T08:03:32.941903Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-04-30T08:03:32.942900Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-04-30T08:03:41.962197Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-05-01T08:09:51.908152Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6470850319174103744] 2025-05-01T08:09:51.914810Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-05-01T08:09:51.914975Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-05-01T08:09:51.915382Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-05-01T08:09:51.915807Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-05-01T08:09:51.916423Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-05-01T08:10:00.937541Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-05-01T17:30:26.144165Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6470850319174103744] 2025-05-01T17:30:26.150767Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-05-01T17:30:26.150947Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-05-01T17:30:26.151328Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-05-01T17:30:26.151728Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-05-01T17:30:26.152402Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-05-01T17:30:35.176860Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-05-02T08:08:08.056604Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1087115819358670081] 2025-05-02T08:08:08.057504Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-05-02T08:08:08.057660Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-05-02T08:08:08.058009Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-05-02T08:08:08.058341Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-05-02T08:08:08.058948Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-05-02T08:08:17.079870Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-05-03T08:05:01.378430Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4122557551890296296] 2025-05-03T08:05:01.380169Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-05-03T08:05:01.380386Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-05-03T08:05:01.380767Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-05-03T08:05:01.381217Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-05-03T08:05:01.381918Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-05-03T08:05:10.403177Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-05-04T08:01:15.225671Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3752018627460877740] 2025-05-04T08:01:15.227212Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-05-04T08:01:15.227358Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-05-04T08:01:15.227734Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-05-04T08:01:15.228550Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-05-04T08:01:15.229177Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-05-04T08:01:24.248971Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-05-05T08:00:53.821998Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11599156926848408551] 2025-05-05T08:00:53.828994Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-05-05T08:00:53.829211Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-05-05T08:00:53.829696Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-05-05T08:00:53.830104Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-05-05T08:00:53.830764Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-05-05T08:01:02.855776Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-05-06T08:03:02.836505Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2737367404476452584] 2025-05-06T08:03:02.838027Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-05-06T08:03:02.838232Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-05-06T08:03:02.838689Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-05-06T08:03:02.839294Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-05-06T08:03:02.840092Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-05-06T08:03:11.860530Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-05-07T08:01:12.596400Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4885342431400240079] 2025-05-07T08:01:12.603194Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-05-07T08:01:12.603386Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-05-07T08:01:12.603838Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-05-07T08:01:12.604383Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-05-07T08:01:12.604990Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-05-07T08:01:21.625831Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-05-08T08:03:18.797732Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11855953723802825100] 2025-05-08T08:03:18.798708Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-05-08T08:03:18.798885Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-05-08T08:03:18.799286Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-05-08T08:03:18.803745Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-05-08T08:03:18.804332Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-05-08T08:03:27.822094Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-05-09T08:09:20.437484Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9472370529103071424] 2025-05-09T08:09:20.444734Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-05-09T08:09:20.444916Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-05-09T08:09:20.445287Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-05-09T08:09:20.445641Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-05-09T08:09:20.446425Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-05-09T08:09:29.466750Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-05-10T08:05:30.961526Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8626075531642805893] 2025-05-10T08:05:30.963446Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-05-10T08:05:30.963620Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-05-10T08:05:30.963977Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-05-10T08:05:30.964406Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-05-10T08:05:30.964984Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-05-10T08:05:39.987196Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-05-11T08:04:44.165384Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6980444799178285075] 2025-05-11T08:04:44.167031Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-05-11T08:04:44.167201Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-05-11T08:04:44.167538Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-05-11T08:04:44.167952Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-05-11T08:04:44.168513Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-05-11T08:04:53.183780Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-05-12T08:09:03.087706Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15238905150737653117] 2025-05-12T08:09:03.090368Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-05-12T08:09:03.090506Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-05-12T08:09:03.090804Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-05-12T08:09:03.091109Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-05-12T08:09:03.095813Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-05-12T08:09:12.113854Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-05-13T08:06:46.043744Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8054989203877338159] 2025-05-13T08:06:46.044644Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-05-13T08:06:46.044787Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-05-13T08:06:46.045135Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-05-13T08:06:46.045490Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-05-13T08:06:46.051880Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-05-13T08:06:55.069968Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-05-14T08:06:41.176202Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14725051979567270370] 2025-05-14T08:06:41.181114Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-05-14T08:06:41.181274Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-05-14T08:06:41.181635Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-05-14T08:06:41.181994Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-05-14T08:06:41.182669Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-05-14T08:06:50.201095Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-05-15T08:10:31.909726Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10784259321599229313] 2025-05-15T08:10:31.911552Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-05-15T08:10:31.911683Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-05-15T08:10:31.911986Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-05-15T08:10:31.912263Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-05-15T08:10:31.912795Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-05-15T08:10:40.934090Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-05-16T08:09:17.303540Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9622081329980026177] 2025-05-16T08:09:17.305075Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-05-16T08:09:17.305224Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-05-16T08:09:17.310515Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-05-16T08:09:17.310905Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-05-16T08:09:17.311557Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-05-16T08:09:26.327269Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-05-17T08:01:46.565084Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4969977121791091903] 2025-05-17T08:01:46.566607Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-05-17T08:01:46.566813Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-05-17T08:01:46.567151Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-05-17T08:01:46.567618Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-05-17T08:01:46.568321Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-05-17T08:01:55.586187Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-05-18T08:05:24.862613Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7623124599297416934] 2025-05-18T08:05:24.869429Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-05-18T08:05:24.869638Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-05-18T08:05:24.870052Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-05-18T08:05:24.870535Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-05-18T08:05:24.871618Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-05-18T08:05:33.891079Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-05-19T08:00:46.444283Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_403709475913989347] 2025-05-19T08:00:46.445258Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-05-19T08:00:46.445422Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-05-19T08:00:46.445800Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-05-19T08:00:46.446235Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-05-19T08:00:46.446890Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-05-19T08:00:55.468057Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-05-20T08:02:02.663653Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14272749664800733809] 2025-05-20T08:02:02.664428Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-05-20T08:02:02.664561Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-05-20T08:02:02.664879Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-05-20T08:02:02.665215Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-05-20T08:02:02.665845Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-05-20T08:02:11.686712Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-05-21T08:04:28.242074Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6825050885332838851] 2025-05-21T08:04:28.243651Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-05-21T08:04:28.243836Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-05-21T08:04:28.244264Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-05-21T08:04:28.244807Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-05-21T08:04:28.245506Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-05-21T08:04:37.263636Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-05-22T08:05:55.920064Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14575372532032625228] 2025-05-22T08:05:55.921591Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-05-22T08:05:55.921785Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-05-22T08:05:55.922371Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-05-22T08:05:55.922775Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-05-22T08:05:55.923497Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-05-22T08:06:04.941855Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-05-23T08:04:15.908642Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8338153022497445029] 2025-05-23T08:04:15.910205Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-05-23T08:04:15.910352Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-05-23T08:04:15.910754Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-05-23T08:04:15.911090Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-05-23T08:04:15.911679Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-05-23T08:04:24.932155Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-05-24T08:09:22.510295Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8014689302326708142] 2025-05-24T08:09:22.512066Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-05-24T08:09:22.512302Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-05-24T08:09:22.512659Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-05-24T08:09:22.513096Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-05-24T08:09:22.513744Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-05-24T08:09:31.529404Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-05-25T08:03:24.617801Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_18008027382496129378] 2025-05-25T08:03:24.618728Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-05-25T08:03:24.618906Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-05-25T08:03:24.619277Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-05-25T08:03:24.619757Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-05-25T08:03:24.620351Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-05-25T08:03:33.641118Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-05-26T08:01:58.538279Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8657248333789125566] 2025-05-26T08:01:58.539276Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-05-26T08:01:58.539444Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-05-26T08:01:58.539951Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-05-26T08:01:58.540332Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-05-26T08:01:58.541127Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-05-26T08:02:07.562643Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-05-27T08:08:54.265173Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6823522236187598788] 2025-05-27T08:08:54.267012Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-05-27T08:08:54.267262Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-05-27T08:08:54.267651Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-05-27T08:08:54.268129Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-05-27T08:08:54.269262Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-05-27T08:09:03.296766Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-05-28T08:06:21.002547Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_13185983238626122924] 2025-05-28T08:06:21.004244Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-05-28T08:06:21.004395Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-05-28T08:06:21.004788Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-05-28T08:06:21.005193Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-05-28T08:06:21.005976Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-05-28T08:06:30.025851Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-05-29T08:10:15.371918Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_177969226442292820] 2025-05-29T08:10:15.373411Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-05-29T08:10:15.373565Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-05-29T08:10:15.373923Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-05-29T08:10:15.379521Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-05-29T08:10:15.380308Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-05-29T08:10:24.395465Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-05-30T08:05:53.441202Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_13712222496651682235] 2025-05-30T08:05:53.442071Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-05-30T08:05:53.442220Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-05-30T08:05:53.442596Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-05-30T08:05:53.448745Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-05-30T08:05:53.449404Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-05-30T08:06:02.486020Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-05-31T08:09:44.478241Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_18054172603178909825] 2025-05-31T08:09:44.479096Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-05-31T08:09:44.479251Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-05-31T08:09:44.479604Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-05-31T08:09:44.480005Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-05-31T08:09:44.480710Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-05-31T08:09:53.501070Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-06-01T08:03:45.582715Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_628856473775417240] 2025-06-01T08:03:45.584659Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-06-01T08:03:45.584827Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-06-01T08:03:45.585289Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-06-01T08:03:45.585797Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-06-01T08:03:45.586632Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-06-01T08:03:54.605303Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-06-02T08:06:53.771148Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5480629650860233457] 2025-06-02T08:06:53.773015Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-06-02T08:06:53.773153Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-06-02T08:06:53.778348Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-06-02T08:06:53.778826Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-06-02T08:06:53.779726Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-06-02T08:07:02.795157Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-06-03T08:08:40.623824Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12904173556876202497] 2025-06-03T08:08:40.628556Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-06-03T08:08:40.628722Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-06-03T08:08:40.629110Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-06-03T08:08:40.629514Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-06-03T08:08:40.630102Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-06-03T08:08:49.652596Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-06-04T08:05:42.921595Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11108349056648112108] 2025-06-04T08:05:42.934062Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-06-04T08:05:42.934226Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-06-04T08:05:42.934626Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-06-04T08:05:42.935988Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-06-04T08:05:42.936698Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-06-04T08:05:51.973324Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-06-05T08:09:59.684043Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3669491281590984428] 2025-06-05T08:09:59.690612Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-06-05T08:09:59.690763Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-06-05T08:09:59.691220Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-06-05T08:09:59.691590Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-06-05T08:09:59.692282Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-06-05T08:10:08.712747Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-06-06T08:01:24.424734Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10570118979436450390] 2025-06-06T08:01:24.426165Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-06-06T08:01:24.426330Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-06-06T08:01:24.426717Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-06-06T08:01:24.427143Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-06-06T08:01:24.427924Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-06-06T08:01:33.451811Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-06-07T08:06:15.290035Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1558718170170957803] 2025-06-07T08:06:15.291040Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-06-07T08:06:15.291318Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-06-07T08:06:15.296640Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-06-07T08:06:15.297074Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-06-07T08:06:15.297836Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-06-07T08:06:24.322801Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-06-08T08:10:12.947091Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15216566147637651678] 2025-06-08T08:10:12.951726Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-06-08T08:10:12.951876Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-06-08T08:10:12.954462Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-06-08T08:10:12.954818Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-06-08T08:10:12.955478Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-06-08T08:10:21.981962Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-06-09T08:06:52.846179Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15038584801804058987] 2025-06-09T08:06:52.847710Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-06-09T08:06:52.847858Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-06-09T08:06:52.848250Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-06-09T08:06:52.853153Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-06-09T08:06:52.853828Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-06-09T08:07:01.868449Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-06-10T08:07:41.264064Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6227159673239902786] 2025-06-10T08:07:41.265039Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-06-10T08:07:41.265207Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-06-10T08:07:41.265722Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-06-10T08:07:41.266139Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-06-10T08:07:41.266759Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-06-10T08:07:50.287661Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-06-11T08:02:26.468453Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9388923633191345809] 2025-06-11T08:02:26.475005Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-06-11T08:02:26.475191Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-06-11T08:02:26.475666Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-06-11T08:02:26.476116Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-06-11T08:02:26.476713Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-06-11T08:02:35.503885Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-06-12T02:15:21.842414Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9388923633191345809] 2025-06-12T02:15:21.844079Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-06-12T02:15:21.844284Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-06-12T02:15:21.844638Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-06-12T02:15:21.845087Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-06-12T02:15:21.845669Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-06-12T02:15:30.868861Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-06-12T08:01:45.375401Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16550341521707715120] 2025-06-12T08:01:45.376359Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-06-12T08:01:45.376523Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-06-12T08:01:45.376868Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-06-12T08:01:45.377216Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-06-12T08:01:45.377812Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-06-12T08:01:54.398794Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-06-13T08:10:02.476570Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10565026107464159445] 2025-06-13T08:10:02.483174Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-06-13T08:10:02.483349Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-06-13T08:10:02.484112Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-06-13T08:10:02.484700Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-06-13T08:10:02.485274Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-06-13T08:10:11.506004Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-06-14T08:01:21.615188Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1697650143305745451] 2025-06-14T08:01:21.616851Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-06-14T08:01:21.617023Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-06-14T08:01:21.617382Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-06-14T08:01:21.617762Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-06-14T08:01:21.618358Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-06-14T08:01:30.634958Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-06-15T08:03:20.056005Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17804015125612949114] 2025-06-15T08:03:20.060649Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-06-15T08:03:20.060825Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-06-15T08:03:20.061161Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-06-15T08:03:20.061662Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-06-15T08:03:20.062296Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-06-15T08:03:29.079644Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-06-16T08:09:47.665115Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14619801613682525461] 2025-06-16T08:09:47.666017Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-06-16T08:09:47.666189Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-06-16T08:09:47.666576Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-06-16T08:09:47.666963Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-06-16T08:09:47.667576Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-06-16T08:09:56.689122Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-06-17T08:09:18.882984Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12445561544011010714] 2025-06-17T08:09:18.884768Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-06-17T08:09:18.884947Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-06-17T08:09:18.885283Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-06-17T08:09:18.885623Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-06-17T08:09:18.891091Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-06-17T08:09:27.906675Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-06-18T08:05:27.999231Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_13501791812682569918] 2025-06-18T08:05:28.000854Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-06-18T08:05:28.001026Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-06-18T08:05:28.006407Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-06-18T08:05:28.006932Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-06-18T08:05:28.007637Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-06-18T08:05:37.026466Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-06-19T08:02:07.696242Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6975516794760381856] 2025-06-19T08:02:07.697875Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-06-19T08:02:07.698081Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-06-19T08:02:07.698452Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-06-19T08:02:07.699089Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-06-19T08:02:07.699752Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-06-19T08:02:16.714928Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-06-20T08:09:14.740451Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14876908664586769961] 2025-06-20T08:09:14.741962Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-06-20T08:09:14.742156Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-06-20T08:09:14.742519Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-06-20T08:09:14.742935Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-06-20T08:09:14.743504Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-06-20T08:09:23.763438Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-06-21T08:07:41.026568Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8367127932862653348] 2025-06-21T08:07:41.028517Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-06-21T08:07:41.028692Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-06-21T08:07:41.029048Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-06-21T08:07:41.029455Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-06-21T08:07:41.030072Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-06-21T08:07:50.045529Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-06-21T20:38:01.783928Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1205643186899930246] 2025-06-21T20:38:01.784901Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-06-21T20:38:01.785085Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-06-21T20:38:01.785420Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-06-21T20:38:01.792905Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-06-21T20:38:01.793681Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-06-21T20:38:10.814691Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-06-22T08:01:14.581126Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2906739966997758830] 2025-06-22T08:01:14.582078Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-06-22T08:01:14.582250Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-06-22T08:01:14.582627Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-06-22T08:01:14.582984Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-06-22T08:01:14.583670Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-06-22T08:01:23.605146Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-06-23T08:03:58.401528Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10688025614776777559] 2025-06-23T08:03:58.403106Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-06-23T08:03:58.403341Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-06-23T08:03:58.403712Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-06-23T08:03:58.404129Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-06-23T08:03:58.404809Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-06-23T08:04:07.425927Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-06-24T08:08:21.568359Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9920640832030942872] 2025-06-24T08:08:21.570020Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-06-24T08:08:21.570212Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-06-24T08:08:21.570569Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-06-24T08:08:21.570982Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-06-24T08:08:21.571763Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-06-24T08:08:30.592916Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-06-25T08:03:00.731109Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8121975531164013738] 2025-06-25T08:03:00.732223Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-06-25T08:03:00.732388Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-06-25T08:03:00.738681Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-06-25T08:03:00.739110Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-06-25T08:03:00.739964Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-06-25T08:03:09.767130Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-06-26T08:10:07.584282Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16998039248263422015] 2025-06-26T08:10:07.586956Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-06-26T08:10:07.587138Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-06-26T08:10:07.587501Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-06-26T08:10:07.588180Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-06-26T08:10:07.588807Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-06-26T08:10:16.611514Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-06-27T08:07:28.720798Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15990953203945410343] 2025-06-27T08:07:28.721785Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-06-27T08:07:28.721953Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-06-27T08:07:28.722329Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-06-27T08:07:28.722978Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-06-27T08:07:28.723775Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-06-27T08:07:37.743390Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-06-28T08:04:32.650578Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11571569821966571322] 2025-06-28T08:04:32.657094Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-06-28T08:04:32.657269Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-06-28T08:04:32.657614Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-06-28T08:04:32.658055Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-06-28T08:04:32.658849Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-06-28T08:04:41.679222Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-06-29T08:09:01.797344Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3715567687388091397] 2025-06-29T08:09:01.799031Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-06-29T08:09:01.799210Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-06-29T08:09:01.799574Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-06-29T08:09:01.799988Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-06-29T08:09:01.800761Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-06-29T08:09:10.824359Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-06-30T08:01:04.826022Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11115259998448571899] 2025-06-30T08:01:04.832810Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-06-30T08:01:04.832976Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-06-30T08:01:04.833283Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-06-30T08:01:04.833615Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-06-30T08:01:04.834228Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-06-30T08:01:13.855389Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-07-01T08:09:25.376320Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16461215213136594183] 2025-07-01T08:09:25.383763Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-07-01T08:09:25.383972Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-07-01T08:09:25.384353Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-07-01T08:09:25.384703Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-07-01T08:09:25.385207Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-07-01T08:09:34.402077Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-07-02T08:04:11.527493Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3102471560025519990] 2025-07-02T08:04:11.528848Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-07-02T08:04:11.529046Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-07-02T08:04:11.529431Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-07-02T08:04:11.529803Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-07-02T08:04:11.530540Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-07-02T08:04:20.554961Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-07-02T23:47:53.921071Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3102471560025519990] 2025-07-02T23:47:53.927313Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-07-02T23:47:53.927534Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-07-02T23:47:53.928079Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-07-02T23:47:53.928554Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-07-02T23:47:53.929622Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-07-02T23:48:02.950126Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-07-03T08:07:29.716689Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12054238171078622496] 2025-07-03T08:07:29.717542Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-07-03T08:07:29.717716Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-07-03T08:07:29.718041Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-07-03T08:07:29.718424Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-07-03T08:07:29.724369Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-07-03T08:07:38.744173Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-07-04T08:01:16.205670Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9381857602412976889] 2025-07-04T08:01:16.207466Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-07-04T08:01:16.207688Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-07-04T08:01:16.208086Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-07-04T08:01:16.208531Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-07-04T08:01:16.209308Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-07-04T08:01:25.233135Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-07-05T08:08:27.326162Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3077044237106025062] 2025-07-05T08:08:27.327909Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-07-05T08:08:27.328124Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-07-05T08:08:27.328449Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-07-05T08:08:27.328870Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-07-05T08:08:27.329706Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-07-05T08:08:36.344887Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-07-06T08:05:50.119284Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1789916679129508883] 2025-07-06T08:05:50.121554Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-07-06T08:05:50.121974Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-07-06T08:05:50.122465Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-07-06T08:05:50.122942Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-07-06T08:05:50.123529Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-07-06T08:05:59.149507Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-07-07T08:10:11.609511Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9130176713058542960] 2025-07-07T08:10:11.610863Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-07-07T08:10:11.611069Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-07-07T08:10:11.617060Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-07-07T08:10:11.617585Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-07-07T08:10:11.618430Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-07-07T08:10:20.638285Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-07-08T08:06:56.301456Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15901764483403261802] 2025-07-08T08:06:56.303308Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-07-08T08:06:56.303508Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-07-08T08:06:56.303858Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-07-08T08:06:56.304291Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-07-08T08:06:56.304862Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-07-08T08:07:05.336088Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-07-09T08:03:46.950751Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4079779671263332568] 2025-07-09T08:03:46.952368Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-07-09T08:03:46.952552Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-07-09T08:03:46.952895Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-07-09T08:03:46.953490Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-07-09T08:03:46.955977Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-07-09T08:03:55.975149Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-07-10T08:07:01.617428Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3439027224565693191] 2025-07-10T08:07:01.618940Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-07-10T08:07:01.619135Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-07-10T08:07:01.619469Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-07-10T08:07:01.619885Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-07-10T08:07:01.620601Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-07-10T08:07:10.638165Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-07-11T08:10:00.737058Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8060587510474399738] 2025-07-11T08:10:00.738645Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-07-11T08:10:00.738884Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-07-11T08:10:00.739236Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-07-11T08:10:00.739645Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-07-11T08:10:00.740407Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-07-11T08:10:09.761070Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-07-12T08:10:28.925893Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3287018866288186749] 2025-07-12T08:10:28.928399Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-07-12T08:10:28.928583Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-07-12T08:10:28.928898Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-07-12T08:10:28.929438Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-07-12T08:10:28.930131Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-07-12T08:10:37.948987Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-07-13T08:05:57.208131Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12255214026177332320] 2025-07-13T08:05:57.209409Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-07-13T08:05:57.209691Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-07-13T08:05:57.210153Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-07-13T08:05:57.210556Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-07-13T08:05:57.211314Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-07-13T08:06:06.233198Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-07-14T08:03:54.883072Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1009918005459704825] 2025-07-14T08:03:54.884820Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-07-14T08:03:54.885070Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-07-14T08:03:54.885443Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-07-14T08:03:54.885937Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-07-14T08:03:54.886733Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-07-14T08:04:03.906795Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-07-15T08:06:37.452435Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14980257354871128856] 2025-07-15T08:06:37.454040Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-07-15T08:06:37.459402Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-07-15T08:06:37.459811Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-07-15T08:06:37.460290Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-07-15T08:06:37.460913Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-07-15T08:06:46.480183Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-07-16T08:06:31.120009Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3485058519651123367] 2025-07-16T08:06:31.121487Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-07-16T08:06:31.121696Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-07-16T08:06:31.122111Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-07-16T08:06:31.122617Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-07-16T08:06:31.123229Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-07-16T08:06:40.139495Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-07-17T08:02:00.959746Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15093079976351226571] 2025-07-17T08:02:00.961487Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-07-17T08:02:00.961681Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-07-17T08:02:00.962019Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-07-17T08:02:00.962440Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-07-17T08:02:00.963088Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-07-17T08:02:09.978790Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-07-18T08:03:41.824239Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2779939189058257802] 2025-07-18T08:03:41.826118Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-07-18T08:03:41.826465Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-07-18T08:03:41.826912Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-07-18T08:03:41.827575Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-07-18T08:03:41.828257Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-07-18T08:03:50.847061Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-07-19T08:03:57.489250Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1348206716688806555] 2025-07-19T08:03:57.490215Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-07-19T08:03:57.490413Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-07-19T08:03:57.496445Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-07-19T08:03:57.496937Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-07-19T08:03:57.497527Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-07-19T08:04:06.513903Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-07-20T08:08:07.396484Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6375111725228494707] 2025-07-20T08:08:07.403313Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-07-20T08:08:07.403517Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-07-20T08:08:07.403893Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-07-20T08:08:07.404256Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-07-20T08:08:07.404999Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-07-20T08:08:16.424363Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-07-21T08:04:14.671344Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3903783143454561340] 2025-07-21T08:04:14.678593Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-07-21T08:04:14.678788Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-07-21T08:04:14.679130Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-07-21T08:04:14.679600Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-07-21T08:04:14.680645Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-07-21T08:04:23.699854Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-07-22T08:08:45.221297Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7088635581156099899] 2025-07-22T08:08:45.227708Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-07-22T08:08:45.227919Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-07-22T08:08:45.228480Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-07-22T08:08:45.229940Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-07-22T08:08:45.230862Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-07-22T08:08:54.254329Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-07-23T08:08:17.374085Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6075555412616282398] 2025-07-23T08:08:17.375799Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-07-23T08:08:17.376037Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-07-23T08:08:17.381421Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-07-23T08:08:17.381851Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-07-23T08:08:17.382534Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-07-23T08:08:26.401717Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-07-24T08:01:22.093996Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7752857929324339602] 2025-07-24T08:01:22.101394Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-07-24T08:01:22.101651Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-07-24T08:01:22.102014Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-07-24T08:01:22.102423Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-07-24T08:01:22.103146Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-07-24T08:01:31.124778Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-07-25T08:03:03.202337Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12698126051224997516] 2025-07-25T08:03:03.208960Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-07-25T08:03:03.209231Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-07-25T08:03:03.209685Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-07-25T08:03:03.210123Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-07-25T08:03:03.211256Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-07-25T08:03:12.231532Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-07-26T08:00:52.682360Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7548395895032510602] 2025-07-26T08:00:52.684141Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-07-26T08:00:52.684431Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-07-26T08:00:52.690043Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-07-26T08:00:52.690718Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-07-26T08:00:52.691452Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-07-26T08:01:01.710644Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-07-27T08:07:13.991714Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11083941881090356370] 2025-07-27T08:07:13.993776Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-07-27T08:07:13.993987Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-07-27T08:07:13.994320Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-07-27T08:07:13.994761Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-07-27T08:07:13.995836Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-07-27T08:07:23.017113Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-07-28T08:08:57.874556Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14494426796355691074] 2025-07-28T08:08:57.876193Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-07-28T08:08:57.876453Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-07-28T08:08:57.876931Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-07-28T08:08:57.877441Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-07-28T08:08:57.878175Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-07-28T08:09:06.914436Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-07-29T08:04:07.260499Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9510512108683403917] 2025-07-29T08:04:07.268364Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-07-29T08:04:07.269050Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-07-29T08:04:07.269919Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-07-29T08:04:07.270855Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-07-29T08:04:07.277687Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-07-29T08:04:16.308152Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-07-30T08:04:45.452485Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12217253103609986915] 2025-07-30T08:04:45.454097Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-07-30T08:04:45.454322Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-07-30T08:04:45.454671Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-07-30T08:04:45.455105Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-07-30T08:04:45.455939Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-07-30T08:04:54.475651Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-07-31T08:08:19.441812Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5704100052814468996] 2025-07-31T08:08:19.442968Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-07-31T08:08:19.443191Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-07-31T08:08:19.449162Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-07-31T08:08:19.449639Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-07-31T08:08:19.450170Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-07-31T08:08:28.466259Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-08-01T08:03:10.474279Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15371288082734974278] 2025-08-01T08:03:10.475945Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-08-01T08:03:10.476166Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-08-01T08:03:10.476497Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-08-01T08:03:10.477095Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-08-01T08:03:10.477834Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-08-01T08:03:19.498575Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-08-02T08:01:21.555018Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_13897207429836098754] 2025-08-02T08:01:21.556888Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-08-02T08:01:21.557117Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-08-02T08:01:21.557572Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-08-02T08:01:21.558143Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-08-02T08:01:21.558790Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-08-02T08:01:30.579261Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-08-03T08:10:16.202992Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11810396151409316737] 2025-08-03T08:10:16.204779Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-08-03T08:10:16.205022Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-08-03T08:10:16.205556Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-08-03T08:10:16.206213Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-08-03T08:10:16.206825Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-08-03T08:10:25.227958Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-08-04T08:08:46.644870Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_13821012515465954867] 2025-08-04T08:08:46.646521Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-08-04T08:08:46.646698Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-08-04T08:08:46.647043Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-08-04T08:08:46.650575Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-08-04T08:08:46.652309Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-08-04T08:08:55.667908Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-08-05T08:06:27.769895Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10301476500288012469] 2025-08-05T08:06:27.770778Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-08-05T08:06:27.770960Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-08-05T08:06:27.771479Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-08-05T08:06:27.771880Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-08-05T08:06:27.772607Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-08-05T08:06:36.792711Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-08-06T08:01:09.925090Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4670940278757589861] 2025-08-06T08:01:09.926813Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-08-06T08:01:09.931739Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-08-06T08:01:09.932113Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-08-06T08:01:09.932557Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-08-06T08:01:09.933276Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-08-06T08:01:18.952466Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-08-07T08:09:49.703254Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1865111464160441299] 2025-08-07T08:09:49.704749Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-08-07T08:09:49.704982Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-08-07T08:09:49.705349Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-08-07T08:09:49.705971Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-08-07T08:09:49.706814Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-08-07T08:09:58.723440Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-08-08T08:02:11.173443Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7240640560286517173] 2025-08-08T08:02:11.174770Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-08-08T08:02:11.180284Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-08-08T08:02:11.180726Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-08-08T08:02:11.181154Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-08-08T08:02:11.181861Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-08-08T08:02:20.200495Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-08-09T08:08:43.555591Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_70707950163170839] 2025-08-09T08:08:43.557220Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-08-09T08:08:43.557436Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-08-09T08:08:43.557869Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-08-09T08:08:43.558407Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-08-09T08:08:43.559017Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-08-09T08:08:52.588286Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-08-10T08:04:25.439119Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1894499480697157451] 2025-08-10T08:04:25.445669Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-08-10T08:04:25.446000Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-08-10T08:04:25.446495Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-08-10T08:04:25.446946Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-08-10T08:04:25.447631Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-08-10T08:04:34.467276Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-08-11T08:04:13.629294Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9911347833748299596] 2025-08-11T08:04:13.635910Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-08-11T08:04:13.636126Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-08-11T08:04:13.636581Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-08-11T08:04:13.636950Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-08-11T08:04:13.637649Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-08-11T08:04:22.656026Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-08-12T08:08:35.104829Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10122829023737909173] 2025-08-12T08:08:35.106932Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-08-12T08:08:35.107226Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-08-12T08:08:35.107868Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-08-12T08:08:35.108333Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-08-12T08:08:35.109092Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-08-12T08:08:44.125226Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-08-13T08:02:03.075631Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16707374772058714940] 2025-08-13T08:02:03.077429Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-08-13T08:02:03.077625Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-08-13T08:02:03.078040Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-08-13T08:02:03.078612Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-08-13T08:02:03.079286Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-08-13T08:02:12.094663Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-08-14T08:05:27.961977Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4293259631944135693] 2025-08-14T08:05:27.963808Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-08-14T08:05:27.964084Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-08-14T08:05:27.964418Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-08-14T08:05:27.964919Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-08-14T08:05:27.965761Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-08-14T08:05:36.986249Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-08-15T08:02:50.459475Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3395927294801500021] 2025-08-15T08:02:50.467231Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-08-15T08:02:50.467448Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-08-15T08:02:50.468221Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-08-15T08:02:50.468947Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-08-15T08:02:50.469554Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-08-15T08:02:59.490017Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-08-16T08:05:08.948715Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2746539603843756636] 2025-08-16T08:05:08.950268Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-08-16T08:05:08.950454Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-08-16T08:05:08.951023Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-08-16T08:05:08.951417Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-08-16T08:05:08.957078Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-08-16T08:05:17.970756Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-08-17T08:03:09.704992Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4135913057367337088] 2025-08-17T08:03:09.705929Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-08-17T08:03:09.706140Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-08-17T08:03:09.712336Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-08-17T08:03:09.712734Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-08-17T08:03:09.713493Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-08-17T08:03:18.730186Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-08-18T08:06:23.285348Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16079197747112352367] 2025-08-18T08:06:23.292139Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-08-18T08:06:23.292565Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-08-18T08:06:23.293111Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-08-18T08:06:23.293807Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-08-18T08:06:23.294671Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-08-18T08:06:32.315811Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-08-19T08:02:26.886945Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7117983474756650503] 2025-08-19T08:02:26.890533Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-08-19T08:02:26.890781Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-08-19T08:02:26.891390Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-08-19T08:02:26.891923Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-08-19T08:02:26.892750Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-08-19T08:02:35.913265Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-08-20T08:09:32.513240Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17012526053226211758] 2025-08-20T08:09:32.514876Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-08-20T08:09:32.515067Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-08-20T08:09:32.515439Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-08-20T08:09:32.515850Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-08-20T08:09:32.516623Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-08-20T08:09:41.537978Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-08-21T08:10:05.847743Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9638938832479468543] 2025-08-21T08:10:05.849313Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-08-21T08:10:05.854798Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-08-21T08:10:05.855277Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-08-21T08:10:05.855667Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-08-21T08:10:05.856343Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-08-21T08:10:14.870775Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-08-22T08:09:47.623224Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8894397042849166342] 2025-08-22T08:09:47.630175Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-08-22T08:09:47.630356Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-08-22T08:09:47.630868Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-08-22T08:09:47.631613Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-08-22T08:09:47.632700Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-08-22T08:09:56.652118Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-08-23T08:05:07.429530Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7171446168445764813] 2025-08-23T08:05:07.430350Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-08-23T08:05:07.430527Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-08-23T08:05:07.430827Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-08-23T08:05:07.431269Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-08-23T08:05:07.431977Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-08-23T08:05:16.452577Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-08-24T08:01:03.634298Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7588392574463716620] 2025-08-24T08:01:03.635353Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-08-24T08:01:03.635609Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-08-24T08:01:03.636031Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-08-24T08:01:03.636581Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-08-24T08:01:03.637220Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-08-24T08:01:12.658356Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-08-25T08:08:29.913871Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5143165116135342376] 2025-08-25T08:08:29.916195Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-08-25T08:08:29.916379Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-08-25T08:08:29.916909Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-08-25T08:08:29.917357Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-08-25T08:08:29.918213Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-08-25T08:08:38.938050Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-08-26T08:05:44.625613Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1929813958289505675] 2025-08-26T08:05:44.627678Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-08-26T08:05:44.627902Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-08-26T08:05:44.628303Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-08-26T08:05:44.628717Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-08-26T08:05:44.629384Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-08-26T08:05:53.654013Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-08-27T08:08:48.601447Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15812053685957081244] 2025-08-27T08:08:48.607803Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-08-27T08:08:48.608014Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-08-27T08:08:48.608376Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-08-27T08:08:48.608825Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-08-27T08:08:48.609464Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-08-27T08:08:57.630606Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-08-28T08:02:18.252478Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7108571356188513539] 2025-08-28T08:02:18.254204Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-08-28T08:02:18.254399Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-08-28T08:02:18.254743Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-08-28T08:02:18.255172Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-08-28T08:02:18.255800Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-08-28T08:02:27.277236Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-08-29T08:04:27.887189Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4381267029573752207] 2025-08-29T08:04:27.888310Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-08-29T08:04:27.888573Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-08-29T08:04:27.889208Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-08-29T08:04:27.895644Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-08-29T08:04:27.896664Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-08-29T08:04:36.923291Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-08-30T08:09:14.876975Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12137157918044990674] 2025-08-30T08:09:14.881163Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-08-30T08:09:14.884141Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-08-30T08:09:14.884605Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-08-30T08:09:14.885009Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-08-30T08:09:14.885730Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-08-30T08:09:23.907617Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-08-31T08:10:03.471198Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6907075647524693491] 2025-08-31T08:10:03.473049Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-08-31T08:10:03.473230Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-08-31T08:10:03.473599Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-08-31T08:10:03.474048Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-08-31T08:10:03.474815Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-08-31T08:10:12.505493Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-09-01T08:03:34.058020Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_906695121582806231] 2025-09-01T08:03:34.065960Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-09-01T08:03:34.066621Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-09-01T08:03:34.067804Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-09-01T08:03:34.068694Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-09-01T08:03:34.070538Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-09-01T08:03:43.100472Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-09-02T08:07:56.339543Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5451604357955692180] 2025-09-02T08:07:56.346413Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-09-02T08:07:56.346606Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-09-02T08:07:56.347002Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-09-02T08:07:56.347389Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-09-02T08:07:56.348077Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-09-02T08:08:05.407442Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-09-03T08:00:59.445072Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12689844175723135673] 2025-09-03T08:00:59.446194Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-09-03T08:00:59.446382Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-09-03T08:00:59.446959Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-09-03T08:00:59.447755Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-09-03T08:00:59.454127Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-09-03T08:01:08.485819Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-09-04T08:07:57.043468Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10756520537063991378] 2025-09-04T08:07:57.044347Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-09-04T08:07:57.044514Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-09-04T08:07:57.044847Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-09-04T08:07:57.045524Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-09-04T08:07:57.046342Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-09-04T08:08:06.072114Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-09-05T08:07:46.596426Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_13098983062906473362] 2025-09-05T08:07:46.599652Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-09-05T08:07:46.599843Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-09-05T08:07:46.600252Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-09-05T08:07:46.600803Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-09-05T08:07:46.601437Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-09-05T08:07:55.626198Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-09-06T08:04:57.159318Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12607141112577279893] 2025-09-06T08:04:57.160970Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-09-06T08:04:57.161199Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-09-06T08:04:57.166859Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-09-06T08:04:57.167527Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-09-06T08:04:57.168138Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-09-06T08:05:06.182855Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-09-07T08:04:37.568195Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2950897212736297440] 2025-09-07T08:04:37.570080Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-09-07T08:04:37.570375Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-09-07T08:04:37.570755Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-09-07T08:04:37.571397Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-09-07T08:04:37.572015Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-09-07T08:04:46.591452Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-09-08T08:03:17.411646Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12214593918646676783] 2025-09-08T08:03:17.423100Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-09-08T08:03:17.423264Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-09-08T08:03:17.423791Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-09-08T08:03:17.430428Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-09-08T08:03:17.431085Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-09-08T08:03:26.498312Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-09-09T08:07:19.407135Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17168290492522571426] 2025-09-09T08:07:19.408010Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-09-09T08:07:19.408201Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-09-09T08:07:19.408565Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-09-09T08:07:19.408972Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-09-09T08:07:19.409804Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-09-09T08:07:28.430596Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-09-10T08:05:00.397874Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5763772040081943828] 2025-09-10T08:05:00.399881Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-09-10T08:05:00.400112Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-09-10T08:05:00.400505Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-09-10T08:05:00.400985Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-09-10T08:05:00.401682Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-09-10T08:05:09.423849Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-09-11T08:08:05.689309Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11566332525896044729] 2025-09-11T08:08:05.690923Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-09-11T08:08:05.691166Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-09-11T08:08:05.691530Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-09-11T08:08:05.692022Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-09-11T08:08:05.692795Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-09-11T08:08:14.713371Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-09-12T08:09:47.705398Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6270407585254757507] 2025-09-12T08:09:47.707031Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-09-12T08:09:47.707252Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-09-12T08:09:47.707658Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-09-12T08:09:47.708063Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-09-12T08:09:47.708603Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-09-12T08:09:56.733186Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-09-13T08:07:21.038901Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2051832330763825561] 2025-09-13T08:07:21.040552Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-09-13T08:07:21.040730Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-09-13T08:07:21.041082Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-09-13T08:07:21.041766Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-09-13T08:07:21.042511Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-09-13T08:07:30.065294Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-09-14T08:03:47.475673Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_18146493730754179744] 2025-09-14T08:03:47.482368Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-09-14T08:03:47.482563Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-09-14T08:03:47.482942Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-09-14T08:03:47.483394Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-09-14T08:03:47.484028Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-09-14T08:03:56.505427Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-09-15T08:09:34.362186Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10687651403550985422] 2025-09-15T08:09:34.363735Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-09-15T08:09:34.364340Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-09-15T08:09:34.370596Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-09-15T08:09:34.371520Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-09-15T08:09:34.372601Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-09-15T08:09:43.400980Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-09-16T08:02:32.578891Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17206695245443099683] 2025-09-16T08:02:32.580487Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-09-16T08:02:32.580727Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-09-16T08:02:32.581070Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-09-16T08:02:32.581530Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-09-16T08:02:32.582480Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-09-16T08:02:41.601487Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-09-17T08:06:26.079436Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3352417116382249659] 2025-09-17T08:06:26.081607Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-09-17T08:06:26.081866Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-09-17T08:06:26.082263Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-09-17T08:06:26.082694Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-09-17T08:06:26.083329Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-09-17T08:06:35.104105Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-09-18T08:09:25.417621Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9417314053933624374] 2025-09-18T08:09:25.424425Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-09-18T08:09:25.424650Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-09-18T08:09:25.425261Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-09-18T08:09:25.425786Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-09-18T08:09:25.426455Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-09-18T08:09:34.446657Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-09-19T08:05:06.424757Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_367718375937617608] 2025-09-19T08:05:06.426409Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-09-19T08:05:06.426626Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-09-19T08:05:06.427057Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-09-19T08:05:06.427537Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-09-19T08:05:06.428145Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-09-19T08:05:15.449667Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-09-20T08:02:03.638093Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_13594937386873946241] 2025-09-20T08:02:03.644973Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-09-20T08:02:03.645252Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-09-20T08:02:03.645636Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-09-20T08:02:03.646096Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-09-20T08:02:03.646766Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-09-20T08:02:12.668315Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-09-21T11:31:06.997931Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5958706896801957284] 2025-09-21T11:31:07.004636Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-09-21T11:31:07.004889Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-09-21T11:31:07.005335Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-09-21T11:31:07.005812Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-09-21T11:31:07.006428Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-09-21T11:31:16.024781Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-09-22T08:07:06.748045Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3824592404932935470] 2025-09-22T08:07:06.754834Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-09-22T08:07:06.755091Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-09-22T08:07:06.755444Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-09-22T08:07:06.755846Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-09-22T08:07:06.756806Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-09-22T08:07:15.776023Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-09-23T08:02:53.607946Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12287497815860258830] 2025-09-23T08:02:53.609759Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-09-23T08:02:53.610035Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-09-23T08:02:53.610402Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-09-23T08:02:53.610841Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-09-23T08:02:53.611496Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-09-23T08:03:02.632578Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-09-24T08:08:27.625302Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_367178645525881667] 2025-09-24T08:08:27.627070Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-09-24T08:08:27.627305Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-09-24T08:08:27.627702Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-09-24T08:08:27.628123Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-09-24T08:08:27.633727Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-09-24T08:08:36.650196Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-09-25T08:03:04.926291Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_337524681172925429] 2025-09-25T08:03:04.928337Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-09-25T08:03:04.928608Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-09-25T08:03:04.929011Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-09-25T08:03:04.929424Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-09-25T08:03:04.930078Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-09-25T08:03:13.948089Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-09-26T08:01:11.683913Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2225445676137118127] 2025-09-26T08:01:11.685227Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-09-26T08:01:11.685413Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-09-26T08:01:11.685795Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-09-26T08:01:11.686389Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-09-26T08:01:11.687234Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-09-26T08:01:20.706632Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-09-26T13:24:54.882570Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10615376458692630253] 2025-09-26T13:24:54.883466Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-09-26T13:24:54.883669Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-09-26T13:24:54.884059Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-09-26T13:24:54.884448Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-09-26T13:24:54.890852Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-09-26T13:25:03.912529Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-09-27T08:04:40.796803Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_27658508189640345] 2025-09-27T08:04:40.797844Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-09-27T08:04:40.798062Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-09-27T08:04:40.798423Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-09-27T08:04:40.798777Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-09-27T08:04:40.799421Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-09-27T08:04:49.820820Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-09-28T08:03:20.299402Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_13021296164298605246] 2025-09-28T08:03:20.305859Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-09-28T08:03:20.306059Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-09-28T08:03:20.306461Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-09-28T08:03:20.306878Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-09-28T08:03:20.307578Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-09-28T08:03:29.328624Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-09-29T08:08:56.285097Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_18202250102915464192] 2025-09-29T08:08:56.291836Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-09-29T08:08:56.292045Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-09-29T08:08:56.292403Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-09-29T08:08:56.292807Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-09-29T08:08:56.293427Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-09-29T08:09:05.310364Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-09-30T08:06:23.562204Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7239766773104082667] 2025-09-30T08:06:23.563892Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-09-30T08:06:23.564129Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-09-30T08:06:23.564602Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-09-30T08:06:23.565073Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-09-30T08:06:23.565763Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-09-30T08:06:32.588381Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-10-01T08:02:43.866249Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6142674339847733267] 2025-10-01T08:02:43.873113Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-10-01T08:02:43.873302Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-10-01T08:02:43.873690Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-10-01T08:02:43.874007Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-10-01T08:02:43.874522Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-10-01T08:02:52.892911Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-10-02T08:04:53.935132Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2082491579621287896] 2025-10-02T08:04:53.935850Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-10-02T08:04:53.936034Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-10-02T08:04:53.936424Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-10-02T08:04:53.936829Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-10-02T08:04:53.943021Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-10-02T08:05:02.957501Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-10-03T08:07:02.081641Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1237332343152952627] 2025-10-03T08:07:02.088331Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-10-03T08:07:02.088592Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-10-03T08:07:02.089015Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-10-03T08:07:02.089431Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-10-03T08:07:02.090381Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-10-03T08:07:11.111759Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-10-04T08:02:04.629642Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1613391937077491852] 2025-10-04T08:02:04.631136Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-10-04T08:02:04.631297Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-10-04T08:02:04.631700Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-10-04T08:02:04.632295Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-10-04T08:02:04.632897Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-10-04T08:02:13.653318Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-10-05T08:04:24.195258Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1361142010815134976] 2025-10-05T08:04:24.196811Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-10-05T08:04:24.197016Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-10-05T08:04:24.197500Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-10-05T08:04:24.197946Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-10-05T08:04:24.198716Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-10-05T08:04:33.225712Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-10-06T08:05:26.800858Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12109749842998047343] 2025-10-06T08:05:26.802669Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-10-06T08:05:26.802896Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-10-06T08:05:26.803286Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-10-06T08:05:26.803819Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-10-06T08:05:26.804414Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-10-06T08:05:35.824834Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-10-07T08:06:32.295523Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1867875560972662782] 2025-10-07T08:06:32.296439Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-10-07T08:06:32.296670Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-10-07T08:06:32.297048Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-10-07T08:06:32.297456Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-10-07T08:06:32.303811Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-10-07T08:06:41.319627Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-10-08T08:08:15.834591Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6266603140430324042] 2025-10-08T08:08:15.835489Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-10-08T08:08:15.835728Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-10-08T08:08:15.836122Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-10-08T08:08:15.836481Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-10-08T08:08:15.843057Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-10-08T08:08:24.863411Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-10-09T08:08:07.100203Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12742684596526664502] 2025-10-09T08:08:07.101703Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-10-09T08:08:07.101940Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-10-09T08:08:07.102270Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-10-09T08:08:07.102639Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-10-09T08:08:07.103426Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-10-09T08:08:16.124003Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-10-10T08:08:16.915371Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_13502316363411026592] 2025-10-10T08:08:16.917052Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-10-10T08:08:16.917311Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-10-10T08:08:16.917696Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-10-10T08:08:16.918156Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-10-10T08:08:16.918971Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-10-10T08:08:25.938332Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-10-11T08:03:58.064237Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11944636796380974137] 2025-10-11T08:03:58.066159Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-10-11T08:03:58.071361Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-10-11T08:03:58.071970Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-10-11T08:03:58.072607Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-10-11T08:03:58.073661Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-10-11T08:04:07.094768Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-10-12T08:06:44.771290Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_18386377070704911207] 2025-10-12T08:06:44.773014Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-10-12T08:06:44.773198Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-10-12T08:06:44.773629Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-10-12T08:06:44.774129Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-10-12T08:06:44.774738Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-10-12T08:06:53.795384Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-10-13T08:02:17.727920Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_810068341083659676] 2025-10-13T08:02:17.729375Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-10-13T08:02:17.735855Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-10-13T08:02:17.741503Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-10-13T08:02:17.742454Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-10-13T08:02:17.743537Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-10-13T08:02:26.769119Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-10-14T08:10:31.854466Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3658051105940650260] 2025-10-14T08:10:31.856165Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-10-14T08:10:31.856288Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-10-14T08:10:31.856605Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-10-14T08:10:31.857071Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-10-14T08:10:31.857658Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-10-14T08:10:40.875892Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-10-15T08:02:34.981267Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4608294641943897877] 2025-10-15T08:02:34.985136Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-10-15T08:02:34.989079Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-10-15T08:02:34.990090Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-10-15T08:02:34.990988Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-10-15T08:02:34.991988Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-10-15T08:02:44.026511Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-10-16T08:03:37.752489Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11686800227286510840] 2025-10-16T08:03:37.759162Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-10-16T08:03:37.759352Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-10-16T08:03:37.759709Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-10-16T08:03:37.760225Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-10-16T08:03:37.760889Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-10-16T08:03:46.784523Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-10-17T08:02:26.195078Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3382659918311503217] 2025-10-17T08:02:26.201867Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-10-17T08:02:26.202286Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-10-17T08:02:26.202636Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-10-17T08:02:26.203052Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-10-17T08:02:26.203723Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-10-17T08:02:35.220647Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-10-18T08:05:59.856562Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9481269710855749576] 2025-10-18T08:05:59.858460Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-10-18T08:05:59.858651Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-10-18T08:05:59.859029Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-10-18T08:05:59.859438Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-10-18T08:05:59.860284Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-10-18T08:06:08.879546Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-10-19T08:09:28.552672Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3138494721377781288] 2025-10-19T08:09:28.553844Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-10-19T08:09:28.554047Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-10-19T08:09:28.554523Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-10-19T08:09:28.554901Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-10-19T08:09:28.555547Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-10-19T08:09:37.576180Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-10-20T08:01:17.703552Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2240825693775137381] 2025-10-20T08:01:17.711381Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-10-20T08:01:17.711559Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-10-20T08:01:17.711984Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-10-20T08:01:17.712374Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-10-20T08:01:17.713118Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-10-20T08:01:26.756794Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-10-21T08:08:48.086064Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15081079787867168444] 2025-10-21T08:08:48.092866Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-10-21T08:08:48.093228Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-10-21T08:08:48.093608Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-10-21T08:08:48.094008Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-10-21T08:08:48.094760Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-10-21T08:08:57.116995Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-10-21T22:41:50.961314Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15081079787867168444] 2025-10-21T22:41:50.962343Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-10-21T22:41:50.962529Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-10-21T22:41:50.963052Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-10-21T22:41:50.969311Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-10-21T22:41:50.970055Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-10-21T22:41:59.989916Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-10-22T08:05:36.763992Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10618008883862897023] 2025-10-22T08:05:36.770791Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-10-22T08:05:36.770992Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-10-22T08:05:36.771396Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-10-22T08:05:36.771895Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-10-22T08:05:36.772905Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-10-22T08:05:45.802425Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-10-23T08:02:48.462580Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_18284203638088264580] 2025-10-23T08:02:48.466081Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-10-23T08:02:48.466302Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-10-23T08:02:48.466676Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-10-23T08:02:48.467135Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-10-23T08:02:48.467807Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-10-23T08:02:57.486845Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-10-24T08:02:40.794071Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11252487031299861864] 2025-10-24T08:02:40.795049Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-10-24T08:02:40.795269Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-10-24T08:02:40.795666Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-10-24T08:02:40.796056Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-10-24T08:02:40.796702Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-10-24T08:02:49.817661Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-10-25T08:02:53.707592Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10188413129919087608] 2025-10-25T08:02:53.708913Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-10-25T08:02:53.709120Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-10-25T08:02:53.709485Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-10-25T08:02:53.709892Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-10-25T08:02:53.715788Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-10-25T08:03:02.730360Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-10-26T08:07:00.721972Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5454971472617770203] 2025-10-26T08:07:00.723296Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-10-26T08:07:00.728542Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-10-26T08:07:00.729045Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-10-26T08:07:00.729639Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-10-26T08:07:00.730240Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-10-26T08:07:09.746862Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-10-27T08:03:52.393518Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7564307723030127392] 2025-10-27T08:03:52.401246Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-10-27T08:03:52.401439Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-10-27T08:03:52.401817Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-10-27T08:03:52.402548Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-10-27T08:03:52.403250Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-10-27T08:04:01.422775Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-10-28T08:10:33.371313Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10877635933303125301] 2025-10-28T08:10:33.373971Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-10-28T08:10:33.374165Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-10-28T08:10:33.374514Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-10-28T08:10:33.374947Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-10-28T08:10:33.375586Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-10-28T08:10:42.393500Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-10-29T08:07:52.003106Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10449895230850455488] 2025-10-29T08:07:52.004642Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-10-29T08:07:52.004841Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-10-29T08:07:52.005221Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-10-29T08:07:52.005646Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-10-29T08:07:52.006334Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-10-29T08:08:01.024631Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-10-30T08:06:50.647925Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14340999162618228274] 2025-10-30T08:06:50.648862Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-10-30T08:06:50.649071Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-10-30T08:06:50.649465Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-10-30T08:06:50.649842Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-10-30T08:06:50.650510Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-10-30T08:06:59.672093Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-10-31T08:03:47.310598Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16770218821518729796] 2025-10-31T08:03:47.312104Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-10-31T08:03:47.312310Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-10-31T08:03:47.312738Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-10-31T08:03:47.313150Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-10-31T08:03:47.314012Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-10-31T08:03:56.335977Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-11-01T08:10:02.567173Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1461909246913640768] 2025-11-01T08:10:02.568754Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-11-01T08:10:02.568948Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-11-01T08:10:02.569296Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-11-01T08:10:02.569839Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-11-01T08:10:02.570535Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-11-01T08:10:11.590202Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-11-02T08:05:11.709973Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1928712422189239758] 2025-11-02T08:05:11.711477Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-11-02T08:05:11.711676Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-11-02T08:05:11.712063Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-11-02T08:05:11.712493Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-11-02T08:05:11.713345Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-11-02T08:05:20.740486Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-11-03T08:07:27.000381Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5953141731672566201] 2025-11-03T08:07:27.001951Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-11-03T08:07:27.002146Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-11-03T08:07:27.002535Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-11-03T08:07:27.002950Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-11-03T08:07:27.003657Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-11-03T08:07:36.023126Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-11-04T08:05:53.375940Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9696752651633090533] 2025-11-04T08:05:53.377663Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-11-04T08:05:53.377856Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-11-04T08:05:53.378202Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-11-04T08:05:53.383750Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-11-04T08:05:53.384675Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-11-04T08:06:02.403295Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-11-05T08:09:04.826422Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4149007713250187772] 2025-11-05T08:09:04.832562Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-11-05T08:09:04.832773Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-11-05T08:09:04.833169Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-11-05T08:09:04.833539Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-11-05T08:09:04.834111Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-11-05T08:09:13.858866Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-11-06T08:05:27.746840Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1081297979233316265] 2025-11-06T08:05:27.748848Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-11-06T08:05:27.749075Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-11-06T08:05:27.749541Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-11-06T08:05:27.750000Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-11-06T08:05:27.750630Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-11-06T08:05:36.775848Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-11-07T08:07:23.859101Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10362556723758607090] 2025-11-07T08:07:23.860785Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-11-07T08:07:23.860972Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-11-07T08:07:23.861351Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-11-07T08:07:23.865727Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-11-07T08:07:23.866956Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-11-07T08:07:32.884663Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-11-08T08:09:05.140749Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6355248113879759440] 2025-11-08T08:09:05.148097Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-11-08T08:09:05.148338Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-11-08T08:09:05.148765Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-11-08T08:09:05.149138Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-11-08T08:09:05.149879Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-11-08T08:09:14.179244Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-11-09T08:08:21.035066Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15901930402018625862] 2025-11-09T08:08:21.036797Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-11-09T08:08:21.037082Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-11-09T08:08:21.037482Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-11-09T08:08:21.037878Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-11-09T08:08:21.038543Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-11-09T08:08:30.061510Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-11-10T08:09:38.080795Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5981513762028971989] 2025-11-10T08:09:38.081758Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-11-10T08:09:38.081950Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-11-10T08:09:38.082675Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-11-10T08:09:38.083199Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-11-10T08:09:38.089221Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-11-10T08:09:47.103791Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-11-11T08:08:09.361011Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_18052448652557341036] 2025-11-11T08:08:09.362669Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-11-11T08:08:09.362862Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-11-11T08:08:09.363214Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-11-11T08:08:09.363672Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-11-11T08:08:09.364368Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-11-11T08:08:18.385214Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-11-12T08:07:50.719201Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2901273225237824725] 2025-11-12T08:07:50.725890Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-11-12T08:07:50.726070Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-11-12T08:07:50.726433Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-11-12T08:07:50.726824Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-11-12T08:07:50.727532Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-11-12T08:07:59.749226Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-11-13T08:02:23.958469Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1866339161115380049] 2025-11-13T08:02:23.960445Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-11-13T08:02:23.960682Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-11-13T08:02:23.961150Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-11-13T08:02:23.961701Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-11-13T08:02:23.962339Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-11-13T08:02:32.986045Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-11-14T08:08:47.265806Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_18055937186134060722] 2025-11-14T08:08:47.267506Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-11-14T08:08:47.267704Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-11-14T08:08:47.268110Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-11-14T08:08:47.268550Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-11-14T08:08:47.269254Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-11-14T08:08:56.287372Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-11-15T08:05:04.471524Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9933166894175138960] 2025-11-15T08:05:04.478144Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-11-15T08:05:04.478345Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-11-15T08:05:04.478716Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-11-15T08:05:04.479149Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-11-15T08:05:04.479809Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-11-15T08:05:13.500837Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-11-16T08:01:07.502261Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15497814890905661777] 2025-11-16T08:01:07.509862Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-11-16T08:01:07.510164Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-11-16T08:01:07.510611Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-11-16T08:01:07.511012Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-11-16T08:01:07.511815Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-11-16T08:01:16.532672Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-11-17T08:00:49.516958Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4499603673773610533] 2025-11-17T08:00:49.518535Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-11-17T08:00:49.518704Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-11-17T08:00:49.519123Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-11-17T08:00:49.519548Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-11-17T08:00:49.520290Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-11-17T08:00:58.539785Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-11-18T08:08:49.480228Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10055900650675122591] 2025-11-18T08:08:49.482256Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-11-18T08:08:49.488688Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-11-18T08:08:49.489680Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-11-18T08:08:49.490594Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-11-18T08:08:49.491568Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-11-18T08:08:58.517859Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-11-19T08:02:40.652448Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8169647482578005851] 2025-11-19T08:02:40.654084Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-11-19T08:02:40.654282Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-11-19T08:02:40.654679Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-11-19T08:02:40.655115Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-11-19T08:02:40.655799Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-11-19T08:02:49.675718Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-11-20T08:06:18.660482Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_18310196629079380775] 2025-11-20T08:06:18.678154Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-11-20T08:06:18.678380Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-11-20T08:06:18.679419Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-11-20T08:06:18.680051Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-11-20T08:06:18.680872Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-11-20T08:06:27.733693Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-11-21T08:03:07.910074Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17331670361640106374] 2025-11-21T08:03:07.911810Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-11-21T08:03:07.911998Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-11-21T08:03:07.912372Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-11-21T08:03:07.912774Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-11-21T08:03:07.914992Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-11-21T08:03:16.929473Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-11-22T08:07:20.139367Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10766498373347005911] 2025-11-22T08:07:20.140233Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-11-22T08:07:20.140433Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-11-22T08:07:20.140830Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-11-22T08:07:20.141449Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-11-22T08:07:20.142109Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-11-22T08:07:29.162860Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-11-23T08:03:58.637485Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5385377629368395549] 2025-11-23T08:03:58.639114Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-11-23T08:03:58.639308Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-11-23T08:03:58.639705Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-11-23T08:03:58.640161Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-11-23T08:03:58.640765Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-11-23T08:04:07.662118Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-11-24T08:08:06.512521Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3439036943945453273] 2025-11-24T08:08:06.514208Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-11-24T08:08:06.514522Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-11-24T08:08:06.515002Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-11-24T08:08:06.515443Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-11-24T08:08:06.516136Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-11-24T08:08:15.536057Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-11-25T08:06:18.696335Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_518879736009845547] 2025-11-25T08:06:18.698076Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-11-25T08:06:18.698304Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-11-25T08:06:18.698653Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-11-25T08:06:18.699083Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-11-25T08:06:18.699751Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-11-25T08:06:27.719977Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-11-26T08:02:10.411466Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3072044369455757434] 2025-11-26T08:02:10.413315Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-11-26T08:02:10.413508Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-11-26T08:02:10.414080Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-11-26T08:02:10.414522Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-11-26T08:02:10.415166Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-11-26T08:02:19.438418Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-11-27T08:06:31.480930Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_710362604394259193] 2025-11-27T08:06:31.482629Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-11-27T08:06:31.482824Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-11-27T08:06:31.483212Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-11-27T08:06:31.483708Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-11-27T08:06:31.484365Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-11-27T08:06:40.507131Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-11-28T08:03:08.728265Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5212128009420502054] 2025-11-28T08:03:08.731266Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-11-28T08:03:08.731482Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-11-28T08:03:08.731898Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-11-28T08:03:08.732280Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-11-28T08:03:08.732915Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-11-28T08:03:17.753784Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-11-29T08:06:40.484564Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16662566593429628391] 2025-11-29T08:06:40.486360Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-11-29T08:06:40.486580Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-11-29T08:06:40.486998Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-11-29T08:06:40.487448Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-11-29T08:06:40.488101Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-11-29T08:06:49.503727Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-11-30T08:04:21.755761Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_13239354506854642992] 2025-11-30T08:04:21.758741Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-11-30T08:04:21.759077Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-11-30T08:04:21.759561Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-11-30T08:04:21.760252Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-11-30T08:04:21.761641Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-11-30T08:04:30.781244Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-12-01T08:03:05.132302Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17707041781314988220] 2025-12-01T08:03:05.139039Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-12-01T08:03:05.139270Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-12-01T08:03:05.139644Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-12-01T08:03:05.140047Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-12-01T08:03:05.140816Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-12-01T08:03:14.165892Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-12-02T08:06:02.491407Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11338798912292830623] 2025-12-02T08:06:02.511656Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-12-02T08:06:02.511847Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-12-02T08:06:02.512269Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-12-02T08:06:02.512643Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-12-02T08:06:02.513306Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-12-02T08:06:11.553320Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-12-03T08:05:45.368902Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3079014665910319262] 2025-12-03T08:05:45.376241Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-12-03T08:05:45.376444Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-12-03T08:05:45.376850Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-12-03T08:05:45.377278Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-12-03T08:05:45.377892Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-12-03T08:05:54.400106Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-12-04T08:09:17.608781Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3313488721903317789] 2025-12-04T08:09:17.615249Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-12-04T08:09:17.615490Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-12-04T08:09:17.615894Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-12-04T08:09:17.616457Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-12-04T08:09:17.617128Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-12-04T08:09:26.637276Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-12-05T08:03:42.590332Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15553552075434529786] 2025-12-05T08:03:42.591916Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-12-05T08:03:42.592126Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-12-05T08:03:42.592558Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-12-05T08:03:42.593035Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-12-05T08:03:42.593673Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-12-05T08:03:51.613600Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-12-06T08:07:32.486911Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9852490953735706499] 2025-12-06T08:07:32.489389Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-12-06T08:07:32.489649Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-12-06T08:07:32.490041Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-12-06T08:07:32.490463Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-12-06T08:07:32.491049Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-12-06T08:07:41.510252Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-12-07T08:01:08.515565Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17529916120382942878] 2025-12-07T08:01:08.517164Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-12-07T08:01:08.517361Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-12-07T08:01:08.517787Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-12-07T08:01:08.518200Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-12-07T08:01:08.518853Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-12-07T08:01:17.538768Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-12-08T08:07:00.213519Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9133217587432245928] 2025-12-08T08:07:00.215067Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-12-08T08:07:00.215262Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-12-08T08:07:00.215612Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-12-08T08:07:00.216042Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-12-08T08:07:00.216588Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-12-08T08:07:09.235714Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-12-09T08:06:09.185081Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11409171052424963176] 2025-12-09T08:06:09.186034Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-12-09T08:06:09.186262Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-12-09T08:06:09.186645Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-12-09T08:06:09.187036Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-12-09T08:06:09.187715Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-12-09T08:06:18.213036Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-12-10T08:05:02.171914Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1177872707074123287] 2025-12-10T08:05:02.173057Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-12-10T08:05:02.173259Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-12-10T08:05:02.173636Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-12-10T08:05:02.174049Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-12-10T08:05:02.180272Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-12-10T08:05:11.197679Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-12-11T08:05:42.977452Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7482798980806557421] 2025-12-11T08:05:42.979120Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-12-11T08:05:42.979431Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-12-11T08:05:42.979829Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-12-11T08:05:42.980241Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-12-11T08:05:42.981029Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-12-11T08:05:52.004474Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-12-12T08:05:09.127250Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11315394407355553607] 2025-12-12T08:05:09.134154Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-12-12T08:05:09.134377Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-12-12T08:05:09.134888Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-12-12T08:05:09.135273Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-12-12T08:05:09.136429Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-12-12T08:05:18.155737Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-12-13T08:04:11.520154Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5213047946719341020] 2025-12-13T08:04:11.522232Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-12-13T08:04:11.522411Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-12-13T08:04:11.522792Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-12-13T08:04:11.523334Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-12-13T08:04:11.524283Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-12-13T08:04:20.544782Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-12-14T08:05:53.190325Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8118319099293373668] 2025-12-14T08:05:53.192399Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-12-14T08:05:53.192642Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-12-14T08:05:53.193401Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-12-14T08:05:53.194123Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-12-14T08:05:53.199605Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-12-14T08:06:02.215084Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-12-15T08:06:59.894132Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9900125041861349492] 2025-12-15T08:06:59.894990Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-12-15T08:06:59.895193Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-12-15T08:06:59.895611Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-12-15T08:06:59.896014Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-12-15T08:06:59.896715Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-12-15T08:07:08.923364Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-12-16T08:07:51.364211Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_13768718844690057860] 2025-12-16T08:07:51.365802Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-12-16T08:07:51.366001Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-12-16T08:07:51.366471Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-12-16T08:07:51.366870Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-12-16T08:07:51.367515Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-12-16T08:08:00.389156Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-12-17T08:05:39.344334Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_3] 2025-12-17T08:05:39.346017Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-12-17T08:05:39.346258Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-12-17T08:05:39.346794Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-12-17T08:05:39.347577Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-12-17T08:05:39.353108Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-12-17T08:05:48.374685Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-12-18T08:02:49.868481Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8808787724855660305] 2025-12-18T08:02:49.870739Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-12-18T08:02:49.870995Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-12-18T08:02:49.871455Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-12-18T08:02:49.871959Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-12-18T08:02:49.872607Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-12-18T08:02:58.893566Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-12-19T08:05:35.929640Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14376924856578957865] 2025-12-19T08:05:35.931460Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-12-19T08:05:35.931751Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-12-19T08:05:35.932136Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-12-19T08:05:35.932566Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-12-19T08:05:35.933329Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-12-19T08:05:44.957042Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-12-20T08:02:07.916864Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10089255893195935086] 2025-12-20T08:02:07.923820Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-12-20T08:02:07.924000Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-12-20T08:02:07.924477Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-12-20T08:02:07.925321Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-12-20T08:02:07.926025Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-12-20T08:02:16.954145Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-12-21T08:01:19.751387Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14497671502130281088] 2025-12-21T08:01:19.752528Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-12-21T08:01:19.758603Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-12-21T08:01:19.759286Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-12-21T08:01:19.759941Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-12-21T08:01:19.760898Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-12-21T08:01:28.793666Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-12-22T08:06:57.186035Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16996519467016428235] 2025-12-22T08:06:57.192660Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-12-22T08:06:57.192911Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-12-22T08:06:57.193298Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-12-22T08:06:57.193745Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-12-22T08:06:57.194389Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-12-22T08:07:06.214509Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-12-23T08:07:32.254701Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4681355509409139136] 2025-12-23T08:07:32.261041Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-12-23T08:07:32.261350Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-12-23T08:07:32.261713Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-12-23T08:07:32.262081Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-12-23T08:07:32.263188Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-12-23T08:07:41.284854Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-12-24T08:06:27.776950Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12141187655876425252] 2025-12-24T08:06:27.778649Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-12-24T08:06:27.778842Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-12-24T08:06:27.779283Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-12-24T08:06:27.779733Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-12-24T08:06:27.786350Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-12-24T08:06:36.809224Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-12-25T08:06:44.767761Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8121775601983851888] 2025-12-25T08:06:44.769146Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-12-25T08:06:44.769364Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-12-25T08:06:44.769708Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-12-25T08:06:44.770154Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-12-25T08:06:44.770888Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-12-25T08:06:53.789108Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-12-26T08:04:50.145298Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14862538135762696219] 2025-12-26T08:04:50.147017Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-12-26T08:04:50.147207Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-12-26T08:04:50.147614Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-12-26T08:04:50.148163Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-12-26T08:04:50.149062Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-12-26T08:04:59.170081Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-12-27T08:01:45.680797Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17057580319626047452] 2025-12-27T08:01:45.687706Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-12-27T08:01:45.687972Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-12-27T08:01:45.688369Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-12-27T08:01:45.688748Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-12-27T08:01:45.689417Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-12-27T08:01:54.711244Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-12-28T08:05:46.191234Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3769416091211865001] 2025-12-28T08:05:46.194842Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-12-28T08:05:46.198126Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-12-28T08:05:46.198536Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-12-28T08:05:46.198931Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-12-28T08:05:46.199604Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-12-28T08:05:55.217125Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-12-29T08:05:31.228746Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9179048806311433875] 2025-12-29T08:05:31.229579Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-12-29T08:05:31.229799Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-12-29T08:05:31.230153Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-12-29T08:05:31.236342Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-12-29T08:05:31.237037Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-12-29T08:05:40.250673Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-12-30T08:06:56.772193Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_388492307341604259] 2025-12-30T08:06:56.779927Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-12-30T08:06:56.780149Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-12-30T08:06:56.780526Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-12-30T08:06:56.781546Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-12-30T08:06:56.782235Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-12-30T08:07:05.803055Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2025-12-31T08:03:52.242589Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16473679963393773802] 2025-12-31T08:03:52.244309Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2025-12-31T08:03:52.244589Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2025-12-31T08:03:52.244989Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2025-12-31T08:03:52.245449Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2025-12-31T08:03:52.246152Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2025-12-31T08:04:01.263195Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-01-01T08:03:11.358744Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5254346453754353270] 2026-01-01T08:03:11.365598Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-01-01T08:03:11.365794Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-01-01T08:03:11.366187Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-01-01T08:03:11.366580Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-01-01T08:03:11.367498Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-01-01T08:03:20.391864Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-01-02T08:01:57.930138Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12885967098810790158] 2026-01-02T08:01:57.931277Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-01-02T08:01:57.931492Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-01-02T08:01:57.932036Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-01-02T08:01:57.932451Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-01-02T08:01:57.933133Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-01-02T08:02:06.959612Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-01-03T08:10:05.223101Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_475969144787703443] 2026-01-03T08:10:05.224574Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-01-03T08:10:05.224768Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-01-03T08:10:05.225161Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-01-03T08:10:05.225530Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-01-03T08:10:05.226160Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-01-03T08:10:14.249457Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-01-04T08:05:09.608306Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_18106637815758740228] 2026-01-04T08:05:09.609930Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-01-04T08:05:09.610130Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-01-04T08:05:09.610541Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-01-04T08:05:09.610920Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-01-04T08:05:09.611910Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-01-04T08:05:18.628188Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-01-05T08:06:34.918714Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3557939905931967588] 2026-01-05T08:06:34.920525Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-01-05T08:06:34.920775Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-01-05T08:06:34.921161Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-01-05T08:06:34.921632Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-01-05T08:06:34.922426Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-01-05T08:06:43.943098Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-01-06T08:09:03.469345Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7470119201137701466] 2026-01-06T08:09:03.476115Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-01-06T08:09:03.476312Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-01-06T08:09:03.476667Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-01-06T08:09:03.477152Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-01-06T08:09:03.477706Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-01-06T08:09:12.495651Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-01-07T08:08:30.590936Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10847072701830882793] 2026-01-07T08:08:30.592655Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-01-07T08:08:30.592852Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-01-07T08:08:30.593276Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-01-07T08:08:30.593925Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-01-07T08:08:30.594762Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-01-07T08:08:39.615245Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-01-08T08:08:21.992445Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5306823266639747418] 2026-01-08T08:08:21.993644Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-01-08T08:08:21.993833Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-01-08T08:08:21.994542Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-01-08T08:08:22.000079Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-01-08T08:08:22.000874Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-01-08T08:08:31.016059Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-01-09T08:02:30.555416Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7114142924235487834] 2026-01-09T08:02:30.562292Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-01-09T08:02:30.562530Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-01-09T08:02:30.562890Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-01-09T08:02:30.563300Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-01-09T08:02:30.564037Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-01-09T08:02:39.585942Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-01-10T08:07:19.251610Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12484900306914992070] 2026-01-10T08:07:19.263171Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-01-10T08:07:19.263387Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-01-10T08:07:19.263746Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-01-10T08:07:19.264105Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-01-10T08:07:19.264792Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-01-10T08:07:28.281048Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-01-11T08:01:43.636289Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15038067349054423189] 2026-01-11T08:01:43.637854Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-01-11T08:01:43.638041Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-01-11T08:01:43.638396Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-01-11T08:01:43.638821Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-01-11T08:01:43.639473Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-01-11T08:01:52.659900Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-01-12T08:06:34.805909Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7683349319842043336] 2026-01-12T08:06:34.813178Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-01-12T08:06:34.813376Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-01-12T08:06:34.813764Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-01-12T08:06:34.814141Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-01-12T08:06:34.814843Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-01-12T08:06:43.834523Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-01-13T08:07:46.716902Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5522917954829039370] 2026-01-13T08:07:46.717878Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-01-13T08:07:46.718066Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-01-13T08:07:46.718452Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-01-13T08:07:46.718837Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-01-13T08:07:46.719490Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-01-13T08:07:55.740851Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-01-14T08:04:00.169560Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17038702779216465067] 2026-01-14T08:04:00.170700Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-01-14T08:04:00.170900Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-01-14T08:04:00.171309Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-01-14T08:04:00.171863Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-01-14T08:04:00.177979Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-01-14T08:04:09.193526Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-01-15T08:05:37.654672Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8710274356688847231] 2026-01-15T08:05:37.656220Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-01-15T08:05:37.656419Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-01-15T08:05:37.656797Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-01-15T08:05:37.658201Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-01-15T08:05:37.658985Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-01-15T08:05:46.687435Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-01-16T08:04:02.322959Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5567790844788712108] 2026-01-16T08:04:02.324670Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-01-16T08:04:02.324888Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-01-16T08:04:02.325258Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-01-16T08:04:02.325735Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-01-16T08:04:02.326413Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-01-16T08:04:11.348894Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-01-17T08:06:19.575009Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17748046713446353412] 2026-01-17T08:06:19.576460Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-01-17T08:06:19.576682Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-01-17T08:06:19.581928Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-01-17T08:06:19.582405Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-01-17T08:06:19.583112Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-01-17T08:06:28.601001Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-01-18T08:05:47.934806Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_13894349109893097680] 2026-01-18T08:05:47.936398Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-01-18T08:05:47.936606Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-01-18T08:05:47.937162Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-01-18T08:05:47.937670Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-01-18T08:05:47.938443Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-01-18T08:05:56.954867Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-01-19T08:02:45.646334Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4744973642536734491] 2026-01-19T08:02:45.647291Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-01-19T08:02:45.647487Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-01-19T08:02:45.647862Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-01-19T08:02:45.648279Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-01-19T08:02:45.649036Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-01-19T08:02:54.669269Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-01-20T08:00:47.847679Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16898857398528637145] 2026-01-20T08:00:47.853816Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-01-20T08:00:47.854218Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-01-20T08:00:47.854584Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-01-20T08:00:47.855001Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-01-20T08:00:47.855700Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-01-20T08:00:56.878720Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-01-21T08:04:13.278741Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6596129635863490939] 2026-01-21T08:04:13.280383Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-01-21T08:04:13.280597Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-01-21T08:04:13.281017Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-01-21T08:04:13.281413Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-01-21T08:04:13.282791Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-01-21T08:04:22.302990Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-01-22T08:00:59.324628Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1209976076880736364] 2026-01-22T08:00:59.329358Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-01-22T08:00:59.329557Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-01-22T08:00:59.329970Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-01-22T08:00:59.330440Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-01-22T08:00:59.331125Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-01-22T08:01:08.359551Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-01-23T08:06:18.143237Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17534493063591990159] 2026-01-23T08:06:18.144894Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-01-23T08:06:18.145103Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-01-23T08:06:18.145459Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-01-23T08:06:18.145972Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-01-23T08:06:18.147249Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-01-23T08:06:27.167192Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-01-24T08:05:39.625246Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8741370614315454405] 2026-01-24T08:05:39.626903Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-01-24T08:05:39.627112Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-01-24T08:05:39.627508Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-01-24T08:05:39.628128Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-01-24T08:05:39.628898Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-01-24T08:05:48.648656Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-01-25T08:07:53.724063Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15966893708740979432] 2026-01-25T08:07:53.724957Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-01-25T08:07:53.725143Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-01-25T08:07:53.725550Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-01-25T08:07:53.725929Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-01-25T08:07:53.732326Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-01-25T08:08:02.748835Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-01-26T08:06:17.939068Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1642394502038617286] 2026-01-26T08:06:17.940891Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-01-26T08:06:17.941096Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-01-26T08:06:17.941469Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-01-26T08:06:17.942078Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-01-26T08:06:17.942893Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-01-26T08:06:26.958933Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-01-27T08:03:27.594068Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_687619122815625263] 2026-01-27T08:03:27.595756Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-01-27T08:03:27.595965Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-01-27T08:03:27.596332Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-01-27T08:03:27.596775Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-01-27T08:03:27.597410Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-01-27T08:03:36.617011Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-01-28T08:07:56.518428Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11474654343692532356] 2026-01-28T08:07:56.519981Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-01-28T08:07:56.520242Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-01-28T08:07:56.520720Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-01-28T08:07:56.521188Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-01-28T08:07:56.522006Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-01-28T08:08:05.540268Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-01-29T08:07:49.390721Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9286366995201829984] 2026-01-29T08:07:49.392174Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-01-29T08:07:49.392378Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-01-29T08:07:49.393383Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-01-29T08:07:49.394701Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-01-29T08:07:49.396500Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-01-29T08:07:58.415825Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-01-30T08:08:35.863530Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_13323045099671751185] 2026-01-30T08:08:35.865075Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-01-30T08:08:35.865274Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-01-30T08:08:35.865662Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-01-30T08:08:35.866260Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-01-30T08:08:35.867071Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-01-30T08:08:44.891182Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-01-31T08:06:12.897862Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7146517879030433642] 2026-01-31T08:06:12.898860Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-01-31T08:06:12.899158Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-01-31T08:06:12.899547Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-01-31T08:06:12.900335Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-01-31T08:06:12.901356Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-01-31T08:06:21.934368Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-02-01T08:03:30.126775Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4261394220548852913] 2026-02-01T08:03:30.128438Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-02-01T08:03:30.128642Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-02-01T08:03:30.129016Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-02-01T08:03:30.129497Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-02-01T08:03:30.130161Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-02-01T08:03:39.148309Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-02-02T08:01:15.105665Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1239668400180726566] 2026-02-02T08:01:15.107236Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-02-02T08:01:15.107433Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-02-02T08:01:15.107802Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-02-02T08:01:15.108278Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-02-02T08:01:15.108898Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-02-02T08:01:24.133479Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-02-03T08:09:11.935838Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15551383438477171170] 2026-02-03T08:09:11.937686Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-02-03T08:09:11.937921Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-02-03T08:09:11.938270Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-02-03T08:09:11.943973Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-02-03T08:09:11.944792Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-02-03T08:09:20.964458Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-02-04T08:08:04.145440Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7827022370297860932] 2026-02-04T08:08:04.147132Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-02-04T08:08:04.147351Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-02-04T08:08:04.152942Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-02-04T08:08:04.153498Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-02-04T08:08:04.154153Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-02-04T08:08:13.172429Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-02-05T08:01:59.766476Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3291588878783982235] 2026-02-05T08:01:59.768092Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-02-05T08:01:59.768287Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-02-05T08:01:59.768680Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-02-05T08:01:59.769299Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-02-05T08:01:59.770003Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-02-05T08:02:08.799073Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-02-06T08:01:03.752257Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8713599451092231427] 2026-02-06T08:01:03.761034Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-02-06T08:01:03.761306Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-02-06T08:01:03.761819Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-02-06T08:01:03.762407Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-02-06T08:01:03.763355Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-02-06T08:01:12.778766Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-02-07T08:05:04.783745Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14170837429584820958] 2026-02-07T08:05:04.785355Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-02-07T08:05:04.785570Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-02-07T08:05:04.785931Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-02-07T08:05:04.786408Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-02-07T08:05:04.787133Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-02-07T08:05:13.809077Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-02-08T08:03:14.634688Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8539665616451903541] 2026-02-08T08:03:14.636736Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-02-08T08:03:14.636933Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-02-08T08:03:14.637567Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-02-08T08:03:14.638122Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-02-08T08:03:14.643885Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-02-08T08:03:23.676762Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-02-09T08:01:22.196220Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5024822420272384908] 2026-02-09T08:01:22.198252Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-02-09T08:01:22.198493Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-02-09T08:01:22.199119Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-02-09T08:01:22.199889Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-02-09T08:01:22.205832Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-02-09T08:01:31.225455Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-02-10T08:05:19.988102Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12541566568952750069] 2026-02-10T08:05:19.994181Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-02-10T08:05:19.994397Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-02-10T08:05:19.994794Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-02-10T08:05:19.995253Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-02-10T08:05:19.996062Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-02-10T08:05:29.021077Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-02-11T08:06:50.571087Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14050031095861173967] 2026-02-11T08:06:50.572626Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-02-11T08:06:50.572830Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-02-11T08:06:50.573203Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-02-11T08:06:50.573642Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-02-11T08:06:50.574428Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-02-11T08:06:59.595174Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-02-12T08:01:15.835687Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6131418856810510636] 2026-02-12T08:01:15.836839Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-02-12T08:01:15.837041Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-02-12T08:01:15.837453Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-02-12T08:01:15.837865Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-02-12T08:01:15.838613Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-02-12T08:01:24.859926Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-02-13T08:03:43.972531Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_13592999275083028978] 2026-02-13T08:03:43.982788Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-02-13T08:03:43.983377Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-02-13T08:03:43.984120Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-02-13T08:03:43.984979Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-02-13T08:03:43.991930Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-02-13T08:03:53.026406Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-02-14T08:08:07.978559Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7453540715377711545] 2026-02-14T08:08:07.980180Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-02-14T08:08:07.980406Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-02-14T08:08:07.980788Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-02-14T08:08:07.981220Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-02-14T08:08:07.981874Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-02-14T08:08:17.003184Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-02-15T08:09:34.007926Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3129729273245404522] 2026-02-15T08:09:34.009456Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-02-15T08:09:34.009674Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-02-15T08:09:34.010154Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-02-15T08:09:34.010626Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-02-15T08:09:34.011370Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-02-15T08:09:43.034017Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-02-16T08:08:47.773882Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6768029235068936470] 2026-02-16T08:08:47.775715Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-02-16T08:08:47.775915Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-02-16T08:08:47.776261Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-02-16T08:08:47.776692Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-02-16T08:08:47.779284Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-02-16T08:08:56.796531Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-02-16T15:10:52.034439Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12507593470755999912] 2026-02-16T15:10:52.035468Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-02-16T15:10:52.035680Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-02-16T15:10:52.036035Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-02-16T15:10:52.036399Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-02-16T15:10:52.037008Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-02-16T15:11:01.068532Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-02-17T08:10:05.016231Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12818588157088335093] 2026-02-17T08:10:05.022321Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-02-17T08:10:05.022523Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-02-17T08:10:05.022947Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-02-17T08:10:05.023379Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-02-17T08:10:05.024197Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-02-17T08:10:14.047288Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-02-18T08:10:22.829316Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14465295716322273914] 2026-02-18T08:10:22.830970Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-02-18T08:10:22.831175Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-02-18T08:10:22.831650Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-02-18T08:10:22.832173Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-02-18T08:10:22.833319Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-02-18T08:10:31.857373Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-02-19T08:04:12.005196Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7160811032477411866] 2026-02-19T08:04:12.012127Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-02-19T08:04:12.012342Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-02-19T08:04:12.012762Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-02-19T08:04:12.013238Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-02-19T08:04:12.013943Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-02-19T08:04:21.093924Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-02-20T08:06:29.834051Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_694840933307833465] 2026-02-20T08:06:29.835819Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-02-20T08:06:29.836062Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-02-20T08:06:29.836510Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-02-20T08:06:29.837051Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-02-20T08:06:29.843137Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-02-20T08:06:38.858059Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-02-20T10:41:05.379498Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_694840933307833465] 2026-02-20T10:41:05.380398Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-02-20T10:41:05.380611Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-02-20T10:41:05.380990Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-02-20T10:41:05.381385Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-02-20T10:41:05.387913Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-02-20T10:41:14.411321Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-02-21T08:06:54.330278Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1383606197879185808] 2026-02-21T08:06:54.331232Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-02-21T08:06:54.331452Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-02-21T08:06:54.331819Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-02-21T08:06:54.332215Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-02-21T08:06:54.338843Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-02-21T08:07:03.354487Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-02-22T08:04:46.884077Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3457861492572447119] 2026-02-22T08:04:46.885875Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-02-22T08:04:46.886090Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-02-22T08:04:46.886612Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-02-22T08:04:46.887105Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-02-22T08:04:46.887844Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-02-22T08:04:55.910643Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-02-23T08:07:15.667301Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_13377831233665266429] 2026-02-23T08:07:15.668889Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-02-23T08:07:15.669156Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-02-23T08:07:15.669580Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-02-23T08:07:15.670224Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-02-23T08:07:15.671008Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-02-23T08:07:24.692202Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-02-24T08:01:57.606888Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_13602556826226001194] 2026-02-24T08:01:57.608309Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-02-24T08:01:57.608578Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-02-24T08:01:57.609035Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-02-24T08:01:57.609514Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-02-24T08:01:57.610174Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-02-24T08:02:06.627956Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-02-25T08:07:02.857322Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16904125213347294741] 2026-02-25T08:07:02.864097Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-02-25T08:07:02.864305Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-02-25T08:07:02.864622Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-02-25T08:07:02.864961Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-02-25T08:07:02.865910Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-02-25T08:07:11.886393Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-02-26T08:04:22.858925Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9133349298783167854] 2026-02-26T08:04:22.870335Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-02-26T08:04:22.870588Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-02-26T08:04:22.870965Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-02-26T08:04:22.871363Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-02-26T08:04:22.872044Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-02-26T08:04:31.897953Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-02-27T08:05:21.800815Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9717001442165172765] 2026-02-27T08:05:21.807518Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-02-27T08:05:21.807750Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-02-27T08:05:21.808092Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-02-27T08:05:21.808408Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-02-27T08:05:21.809004Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-02-27T08:05:30.827273Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-02-28T08:10:22.723117Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10917522725504737175] 2026-02-28T08:10:22.729837Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-02-28T08:10:22.730038Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-02-28T08:10:22.730349Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-02-28T08:10:22.730749Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-02-28T08:10:22.731356Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-02-28T08:10:31.752571Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-03-01T08:09:36.186203Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17652298977492575163] 2026-03-01T08:09:36.187783Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-03-01T08:09:36.187987Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-03-01T08:09:36.188343Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-03-01T08:09:36.188733Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-03-01T08:09:36.189413Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-03-01T08:09:45.205427Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-03-02T08:06:13.455245Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12514442207478977797] 2026-03-02T08:06:13.456897Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-03-02T08:06:13.457085Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-03-02T08:06:13.458503Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-03-02T08:06:13.463270Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-03-02T08:06:13.464163Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-03-02T08:06:22.493504Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-03-03T08:01:54.465342Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17870835971151014465] 2026-03-03T08:01:54.467042Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-03-03T08:01:54.467321Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-03-03T08:01:54.467805Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-03-03T08:01:54.468141Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-03-03T08:01:54.468832Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-03-03T08:02:03.491954Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-03-04T08:06:41.123843Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_194829384870115850] 2026-03-04T08:06:41.129853Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-03-04T08:06:41.130058Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-03-04T08:06:41.130486Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-03-04T08:06:41.130897Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-03-04T08:06:41.132517Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-03-04T08:06:50.153637Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-03-05T08:02:12.128097Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_476791683391400740] 2026-03-05T08:02:12.134924Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-03-05T08:02:12.135156Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-03-05T08:02:12.135557Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-03-05T08:02:12.136018Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-03-05T08:02:12.136918Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-03-05T08:02:21.155517Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-03-06T08:04:41.883281Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7824524472211073196] 2026-03-06T08:04:41.885319Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-03-06T08:04:41.885545Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-03-06T08:04:41.885959Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-03-06T08:04:41.886457Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-03-06T08:04:41.887247Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-03-06T08:04:50.908130Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-03-07T08:07:16.253222Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11674983832647979031] 2026-03-07T08:07:16.255019Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-03-07T08:07:16.255214Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-03-07T08:07:16.255556Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-03-07T08:07:16.255970Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-03-07T08:07:16.256591Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-03-07T08:07:25.275552Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-03-08T08:04:00.858513Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15466803305208487985] 2026-03-08T08:04:00.860536Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-03-08T08:04:00.860728Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-03-08T08:04:00.861071Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-03-08T08:04:00.861477Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-03-08T08:04:00.862008Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-03-08T08:04:09.881398Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-03-09T08:00:41.812220Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4699921254487106844] 2026-03-09T08:00:41.815665Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-03-09T08:00:41.815859Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-03-09T08:00:41.816275Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-03-09T08:00:41.820290Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-03-09T08:00:41.820934Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-03-09T08:00:50.836455Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-03-10T08:00:56.906180Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2588762250223080840] 2026-03-10T08:00:56.907810Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-03-10T08:00:56.908013Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-03-10T08:00:56.908372Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-03-10T08:00:56.908760Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-03-10T08:00:56.909356Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-03-10T08:01:05.933429Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-03-11T08:05:42.366838Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5300146591072354106] 2026-03-11T08:05:42.367694Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-03-11T08:05:42.373345Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-03-11T08:05:42.373728Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-03-11T08:05:42.374097Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-03-11T08:05:42.374724Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-03-11T08:05:51.389780Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-03-12T08:08:02.365624Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1767235881832717705] 2026-03-12T08:08:02.372816Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-03-12T08:08:02.373025Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-03-12T08:08:02.373348Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-03-12T08:08:02.373672Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-03-12T08:08:02.374596Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-03-12T08:08:11.398819Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-03-13T08:01:46.664943Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5623575871243021088] 2026-03-13T08:01:46.667113Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-03-13T08:01:46.667346Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-03-13T08:01:46.667870Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-03-13T08:01:46.668342Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-03-13T08:01:46.669114Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-03-13T08:01:55.690495Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-03-14T08:01:17.510148Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5188373944512603218] 2026-03-14T08:01:17.511934Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-03-14T08:01:17.512146Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-03-14T08:01:17.512536Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-03-14T08:01:17.512968Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-03-14T08:01:17.513681Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-03-14T08:01:26.534879Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-03-15T08:07:43.738994Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11089418477921119509] 2026-03-15T08:07:43.741165Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-03-15T08:07:43.741436Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-03-15T08:07:43.741816Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-03-15T08:07:43.742302Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-03-15T08:07:43.742823Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-03-15T08:07:52.768196Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-03-16T08:03:52.611015Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15724374535715008786] 2026-03-16T08:03:52.612005Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-03-16T08:03:52.612225Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-03-16T08:03:52.612563Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-03-16T08:03:52.612876Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-03-16T08:03:52.613462Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-03-16T08:04:01.635750Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-03-17T08:09:52.382518Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1229433856255821387] 2026-03-17T08:09:52.383896Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-03-17T08:09:52.384101Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-03-17T08:09:52.390073Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-03-17T08:09:52.390513Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-03-17T08:09:52.391364Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-03-17T08:10:01.416958Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-03-18T08:05:31.642920Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7210915968896425907] 2026-03-18T08:05:31.647588Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-03-18T08:05:31.647787Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-03-18T08:05:31.648856Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-03-18T08:05:31.649384Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-03-18T08:05:31.651701Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-03-18T08:05:40.675240Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-03-19T08:06:09.385196Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6656206894170010199] 2026-03-19T08:06:09.392086Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-03-19T08:06:09.392284Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-03-19T08:06:09.392673Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-03-19T08:06:09.393015Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-03-19T08:06:09.393792Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-03-19T08:06:18.412857Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-03-20T08:08:12.267295Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12321934114466201014] 2026-03-20T08:08:12.282133Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-03-20T08:08:12.282440Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-03-20T08:08:12.282871Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-03-20T08:08:12.283471Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-03-20T08:08:12.284318Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-03-20T08:08:21.308291Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-03-21T08:02:47.550422Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3181197880287614850] 2026-03-21T08:02:47.552121Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-03-21T08:02:47.552337Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-03-21T08:02:47.552760Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-03-21T08:02:47.553117Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-03-21T08:02:47.558746Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-03-21T08:02:56.578346Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-03-22T08:07:14.451494Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_480306256708793732] 2026-03-22T08:07:14.452444Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-03-22T08:07:14.452671Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-03-22T08:07:14.453142Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-03-22T08:07:14.459374Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-03-22T08:07:14.459923Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-03-22T08:07:23.479882Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-03-23T08:03:11.420050Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2058168741685310505] 2026-03-23T08:03:11.427680Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-03-23T08:03:11.427914Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-03-23T08:03:11.428270Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-03-23T08:03:11.428671Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-03-23T08:03:11.429247Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-03-23T08:03:22.529352Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-03-24T08:08:08.561922Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6132735078581598870] 2026-03-24T08:08:08.563767Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-03-24T08:08:08.564009Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-03-24T08:08:08.565807Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-03-24T08:08:08.566487Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-03-24T08:08:08.567448Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-03-24T08:08:17.583862Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-03-25T08:10:08.969672Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_550944651010497692] 2026-03-25T08:10:08.971412Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-03-25T08:10:08.971609Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-03-25T08:10:08.971978Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-03-25T08:10:08.972368Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-03-25T08:10:08.972970Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-03-25T08:10:17.988433Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-03-26T08:05:19.188322Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1793695608623539496] 2026-03-26T08:05:19.195325Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-03-26T08:05:19.195527Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-03-26T08:05:19.195890Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-03-26T08:05:19.196246Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-03-26T08:05:19.196730Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-03-26T08:05:28.212305Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-03-27T08:07:02.032308Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3388772747823643345] 2026-03-27T08:07:02.040315Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-03-27T08:07:02.040506Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-03-27T08:07:02.040913Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-03-27T08:07:02.041704Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-03-27T08:07:02.042691Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-03-27T08:07:11.093595Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-03-28T08:10:12.232599Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4789032257207065870] 2026-03-28T08:10:12.233532Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-03-28T08:10:12.233717Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-03-28T08:10:12.234815Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-03-28T08:10:12.235260Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-03-28T08:10:12.236039Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-03-28T08:10:21.255268Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-03-29T08:04:52.650726Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6681088900491492139] 2026-03-29T08:04:52.652438Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-03-29T08:04:52.652635Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-03-29T08:04:52.653647Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-03-29T08:04:52.654102Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-03-29T08:04:52.657279Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-03-29T08:05:01.671771Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-03-30T08:06:25.066642Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15040408995685790265] 2026-03-30T08:06:25.068382Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-03-30T08:06:25.068583Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-03-30T08:06:25.069497Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-03-30T08:06:25.070166Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-03-30T08:06:25.070839Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-03-30T08:06:34.090620Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-03-31T08:09:28.261479Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9222577976753166648] 2026-03-31T08:09:28.263382Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-03-31T08:09:28.268970Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-03-31T08:09:28.270194Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-03-31T08:09:28.270903Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-03-31T08:09:28.271557Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-03-31T08:09:37.292870Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-04-01T08:07:29.925619Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_833823913299184783] 2026-04-01T08:07:29.927303Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-04-01T08:07:29.928095Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-04-01T08:07:29.928483Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-04-01T08:07:29.928921Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-04-01T08:07:29.929569Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-04-01T08:07:38.954680Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-04-02T08:07:08.586285Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6621361517125215578] 2026-04-02T08:07:08.588124Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-04-02T08:07:08.588298Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-04-02T08:07:08.588679Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-04-02T08:07:08.589099Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-04-02T08:07:08.589888Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-04-02T08:07:17.614566Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-04-03T08:05:27.940825Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14597854010639816633] 2026-04-03T08:05:27.947527Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-04-03T08:05:27.947732Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-04-03T08:05:27.948107Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-04-03T08:05:27.948682Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-04-03T08:05:27.949822Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-04-03T08:05:36.972910Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-04-04T08:06:41.631747Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_30972763196632364] 2026-04-04T08:06:41.638565Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-04-04T08:06:41.638766Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-04-04T08:06:41.639752Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-04-04T08:06:41.640221Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-04-04T08:06:41.640842Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-04-04T08:06:50.664100Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-04-05T08:09:59.538999Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15632930250686432183] 2026-04-05T08:09:59.541355Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-04-05T08:09:59.546203Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-04-05T08:09:59.546590Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-04-05T08:09:59.546992Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-04-05T08:09:59.547600Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-04-05T08:10:08.569891Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-04-06T08:09:10.757429Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5952393972429930119] 2026-04-06T08:09:10.759292Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-04-06T08:09:10.759507Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-04-06T08:09:10.759935Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-04-06T08:09:10.760357Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-04-06T08:09:10.760917Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-04-06T08:09:19.788518Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-04-07T08:01:59.057673Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17292573098323894960] 2026-04-07T08:01:59.059428Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-04-07T08:01:59.060064Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-04-07T08:01:59.063181Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-04-07T08:01:59.063893Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-04-07T08:01:59.064663Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-04-07T08:02:08.082520Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-04-08T08:09:57.952494Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2483787149477844403] 2026-04-08T08:09:57.955518Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-04-08T08:09:57.955734Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-04-08T08:09:57.959605Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-04-08T08:09:57.960040Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-04-08T08:09:57.960662Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-04-08T08:10:06.985148Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-04-09T08:05:22.023676Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4586921699185816115] 2026-04-09T08:05:22.030514Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-04-09T08:05:22.030736Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-04-09T08:05:22.031102Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-04-09T08:05:22.031509Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-04-09T08:05:22.032152Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-04-09T08:05:31.053739Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-04-10T08:05:07.386821Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14519145970921267846] 2026-04-10T08:05:07.394114Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-04-10T08:05:07.394356Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-04-10T08:05:07.394750Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-04-10T08:05:07.395232Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-04-10T08:05:07.395829Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-04-10T08:05:16.416521Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-04-11T08:09:34.586973Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4279249033000215456] 2026-04-11T08:09:34.588607Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-04-11T08:09:34.588842Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-04-11T08:09:34.594405Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-04-11T08:09:34.594866Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-04-11T08:09:34.595545Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-04-11T08:09:43.610191Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-04-12T08:09:02.571947Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7672536090971048314] 2026-04-12T08:09:02.589639Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-04-12T08:09:02.590264Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-04-12T08:09:02.606657Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-04-12T08:09:02.607740Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-04-12T08:09:02.609202Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-04-12T08:09:11.642052Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-04-13T08:01:27.595308Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14726256141829957406] 2026-04-13T08:01:27.597192Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-04-13T08:01:27.597389Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-04-13T08:01:27.597768Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-04-13T08:01:27.598109Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-04-13T08:01:27.598773Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-04-13T08:01:36.621247Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-04-14T08:08:42.168394Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17764695031675776513] 2026-04-14T08:08:42.170915Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-04-14T08:08:42.171134Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-04-14T08:08:42.171527Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-04-14T08:08:42.172161Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-04-14T08:08:42.172842Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-04-14T08:08:51.192296Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-04-15T08:08:31.541180Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1906721894482462974] 2026-04-15T08:08:31.542197Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-04-15T08:08:31.542390Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-04-15T08:08:31.542736Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-04-15T08:08:31.543081Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-04-15T08:08:31.543738Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-04-15T08:08:40.615830Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-04-16T08:02:39.326895Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17908642384517243401] 2026-04-16T08:02:39.333918Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-04-16T08:02:39.334151Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-04-16T08:02:39.334493Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-04-16T08:02:39.334890Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-04-16T08:02:39.335711Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-04-16T08:02:48.356400Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-04-17T08:09:45.419147Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_7476680674734283426] 2026-04-17T08:09:45.421018Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-04-17T08:09:45.421243Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-04-17T08:09:45.421585Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-04-17T08:09:45.421971Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-04-17T08:09:45.422581Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-04-17T08:09:54.442365Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-04-18T08:00:59.446096Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_2876823056161185009] 2026-04-18T08:00:59.447889Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-04-18T08:00:59.448087Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-04-18T08:00:59.448471Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-04-18T08:00:59.449141Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-04-18T08:00:59.449732Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-04-18T08:01:08.474742Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-04-19T08:01:46.160939Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_10056802340996380914] 2026-04-19T08:01:46.167399Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-04-19T08:01:46.167599Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-04-19T08:01:46.167949Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-04-19T08:01:46.168330Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-04-19T08:01:46.168908Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-04-19T08:01:55.188067Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-04-20T08:06:32.089826Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_13450532144945035535] 2026-04-20T08:06:32.096020Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-04-20T08:06:32.096217Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-04-20T08:06:32.096592Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-04-20T08:06:32.096998Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-04-20T08:06:32.097651Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-04-20T08:06:41.117417Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-04-21T08:09:08.080800Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16982582309893671136] 2026-04-21T08:09:08.082871Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-04-21T08:09:08.083073Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-04-21T08:09:08.088162Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-04-21T08:09:08.088658Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-04-21T08:09:08.089240Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-04-21T08:09:17.108813Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-04-22T08:05:25.737197Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6797264685265949387] 2026-04-22T08:05:25.738999Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-04-22T08:05:25.739251Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-04-22T08:05:25.739606Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-04-22T08:05:25.739993Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-04-22T08:05:25.740565Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-04-22T08:05:34.762606Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-04-23T08:05:20.391889Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16173059924093718763] 2026-04-23T08:05:20.393521Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-04-23T08:05:20.393723Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-04-23T08:05:20.394112Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-04-23T08:05:20.394540Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-04-23T08:05:20.395721Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-04-23T08:05:29.419226Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-04-24T08:06:50.091533Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_16289575277442089736] 2026-04-24T08:06:50.093321Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-04-24T08:06:50.093557Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-04-24T08:06:50.093903Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-04-24T08:06:50.094419Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-04-24T08:06:50.095123Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-04-24T08:06:59.117595Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-04-25T08:01:28.159465Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_17060299479271653253] 2026-04-25T08:01:28.166610Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-04-25T08:01:28.166947Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-04-25T08:01:28.167337Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-04-25T08:01:28.167695Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-04-25T08:01:28.168330Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-04-25T08:01:37.187934Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-04-26T08:02:42.234263Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3133739889705583947] 2026-04-26T08:02:42.242282Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-04-26T08:02:42.242509Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-04-26T08:02:42.242898Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-04-26T08:02:42.243311Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-04-26T08:02:42.243919Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-04-26T08:02:51.277179Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-04-27T08:05:40.087518Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1754296689045295362] 2026-04-27T08:05:40.090964Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-04-27T08:05:40.091195Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-04-27T08:05:40.091557Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-04-27T08:05:40.097526Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-04-27T08:05:40.098739Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-04-27T08:05:49.134950Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-04-28T08:06:28.860067Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1976179685302620564] 2026-04-28T08:06:28.862209Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-04-28T08:06:28.862410Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-04-28T08:06:28.862790Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-04-28T08:06:28.863195Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-04-28T08:06:28.863860Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-04-28T08:06:37.891885Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-04-29T08:02:05.173477Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1256271156395105221] 2026-04-29T08:02:05.175181Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-04-29T08:02:05.175348Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-04-29T08:02:05.175686Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-04-29T08:02:05.176088Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-04-29T08:02:05.176963Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-04-29T08:02:14.196550Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-05-02T16:20:52.246475Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_1] 2026-05-02T16:20:52.394173Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-05-02T16:20:52.395182Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-05-02T16:20:52.405719Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-05-02T16:20:52.414774Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-05-02T16:20:52.416900Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-05-02T16:21:01.461229Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-05-02T23:32:23.850972Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_168434477816953081] 2026-05-02T23:32:23.852839Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-05-02T23:32:23.853076Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-05-02T23:32:23.853472Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-05-02T23:32:23.853899Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-05-02T23:32:23.854596Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-05-02T23:32:32.874425Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-05-03T08:09:21.370907Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_15936045383634803140] 2026-05-03T08:09:21.371965Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-05-03T08:09:21.372177Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-05-03T08:09:21.372537Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-05-03T08:09:21.372970Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-05-03T08:09:21.373639Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-05-03T08:09:30.399737Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-05-04T08:02:15.757795Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_11005480395847401168] 2026-05-04T08:02:15.759297Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-05-04T08:02:15.759489Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-05-04T08:02:15.759886Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-05-04T08:02:15.760257Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-05-04T08:02:15.760752Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-05-04T08:02:24.801798Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-05-05T08:03:51.197834Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_5747847391598956599] 2026-05-05T08:03:51.199651Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-05-05T08:03:51.199830Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-05-05T08:03:51.200312Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-05-05T08:03:51.200993Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-05-05T08:03:51.201706Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-05-05T08:04:00.233715Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-05-05T17:20:22.950700Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12591951574837238145] 2026-05-05T17:20:22.955148Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-05-05T17:20:22.955558Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-05-05T17:20:22.955951Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-05-05T17:20:22.959200Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-05-05T17:20:22.959876Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-05-05T17:20:31.977997Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-05-05T17:20:44.647532Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_3583497959207073869] 2026-05-05T17:20:44.648563Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-05-05T17:20:44.648792Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-05-05T17:20:44.649215Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-05-05T17:20:44.649537Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-05-05T17:20:44.650202Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-05-05T17:20:53.675830Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-05-05T17:22:18.763171Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_8119785119692935308] 2026-05-05T17:22:18.764144Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-05-05T17:22:18.764380Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-05-05T17:22:18.764727Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-05-05T17:22:18.765209Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-05-05T17:22:18.771500Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-05-05T17:22:27.787798Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-05-05T17:24:53.553165Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_14744010674108245558] 2026-05-05T17:24:53.554799Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-05-05T17:24:53.555003Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-05-05T17:24:53.555546Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-05-05T17:24:53.555992Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-05-05T17:24:53.562318Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-05-05T17:25:02.576795Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-05-05T17:28:19.903405Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_13021591140805718365] 2026-05-05T17:28:19.905407Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-05-05T17:28:19.905689Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-05-05T17:28:19.906121Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-05-05T17:28:19.912089Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-05-05T17:28:19.913894Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-05-05T17:28:28.956047Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-05-05T17:28:44.354771Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_2] 2026-05-05T17:28:44.355739Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-05-05T17:28:44.355940Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-05-05T17:28:44.356328Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-05-05T17:28:44.356708Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-05-05T17:28:44.357267Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-05-05T17:28:53.384130Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-05-05T19:04:23.172244Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1777214637860514102] 2026-05-05T19:04:23.184742Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-05-05T19:04:23.184918Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-05-05T19:04:23.185285Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-05-05T19:04:23.185672Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-05-05T19:04:23.186350Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-05-05T19:04:32.205709Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-05-05T19:54:46.368303Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [incarnation_1] 2026-05-05T19:54:46.393494Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-05-05T19:54:46.393705Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-05-05T19:54:46.396940Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-05-05T19:54:46.403013Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-05-05T19:54:46.403735Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-05-05T19:54:55.417752Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-05-06T08:03:24.959181Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_123886023981371288] 2026-05-06T08:03:24.977112Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-05-06T08:03:24.977354Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-05-06T08:03:24.977742Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-05-06T08:03:24.978080Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-05-06T08:03:24.978796Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-05-06T08:03:36.262372Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-05-07T08:02:53.836609Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_1748738005504664507] 2026-05-07T08:02:53.854625Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-05-07T08:02:53.854914Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-05-07T08:02:53.855290Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-05-07T08:02:53.855709Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-05-07T08:02:53.856308Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-05-07T08:03:03.960895Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-05-08T08:08:33.170732Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4412215284241895612] 2026-05-08T08:08:33.189495Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-05-08T08:08:33.189724Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-05-08T08:08:33.190096Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-05-08T08:08:33.197323Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-05-08T08:08:33.197990Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-05-08T08:08:43.639943Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-05-08T10:09:46.179642Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_18018736956717387491] 2026-05-08T10:09:46.199098Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-05-08T10:09:46.199302Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-05-08T10:09:46.199755Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-05-08T10:09:46.200119Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-05-08T10:09:46.200735Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-05-08T10:09:57.592781Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-05-08T10:46:10.544356Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_9764139649512700721] 2026-05-08T10:46:10.556556Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-05-08T10:46:10.564929Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-05-08T10:46:10.565648Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-05-08T10:46:10.566447Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-05-08T10:46:10.573034Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-05-08T10:46:20.723553Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-05-08T10:46:52.395224Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_4075725367424069951] 2026-05-08T10:46:52.402129Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-05-08T10:46:52.402332Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-05-08T10:46:52.402716Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-05-08T10:46:52.403471Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-05-08T10:46:52.440815Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-05-08T10:47:02.653917Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-05-08T12:02:48.479562Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_12818066546645663648] 2026-05-08T12:02:48.533722Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-05-08T12:02:48.534506Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-05-08T12:02:48.550953Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-05-08T12:02:48.563246Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-05-08T12:02:48.564862Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-05-08T12:02:59.668366Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e 2026-05-08T19:09:15.786209Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Target handler state: enabled [etag_6724943751307980894] 2026-05-08T19:09:15.844149Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] [Enable] current handler state is: enabled 2026-05-08T19:09:15.844324Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Update settings file: 0.settings 2026-05-08T19:09:15.844632Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Requested extension state: enabled 2026-05-08T19:09:15.844991Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Enable extension: [./install.sh enable] 2026-05-08T19:09:15.845604Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Executing command: /var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1/./install.sh enable with environment variables: {"AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE": "NOT_RUN", "AZURE_GUEST_AGENT_EXTENSION_VERSION": "1.4.2059.1", "AZURE_GUEST_AGENT_EXTENSION_SUPPORTED_FEATURES": "[{\"Value\": \"1.0\", \"Key\": \"ExtensionTelemetryPipeline\"}]", "AZURE_GUEST_AGENT_EXTENSION_PATH": "/var/lib/waagent/Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1", "ConfigSequenceNumber": "0", "AZURE_GUEST_AGENT_WIRE_PROTOCOL_ADDRESS": "168.63.129.16"} 2026-05-08T19:09:29.157166Z INFO ExtHandler [Microsoft.Azure.NetworkWatcher.NetworkWatcherAgentLinux-1.4.2059.1] Command: ./install.sh enable [stdout] Checking if system is supported This system is supported Enabling Azure Network Watcher Agent Force kill all NetworkWatcher Agent related processes Linux version 3.10.0-1160.6.1.el7.x86_64 (mockbuild@kbuilder.bsys.centos.org) (gcc version 4.8.5 20150623 (Red Hat 4.8.5-44) (GCC) ) #1 SMP Tue Nov 17 13:59:11 UTC 2020 Setting up Red Hat environment for SSL handshakes Starting AzureNetworkWatcherAgent...Started[0] Core limit: 0 [stderr] sable() { echo "Disabling Azure Network Watcher Agent" /etc/init.d/AzureNetworkWatcherAgent stop > /dev/null 2>&1 forceKillOldAgent } uninstall() { echo "Uninstalling Azure Network Watcher Agent" forceKillOldAgent ./NetworkWatcherAgent/NetworkWatcherAgent UnRegister /service /autoStart > /dev/null 2>&1 } install() { echo "Installing Azure Network Watcher Agent" forceKillOldAgent continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Uninstalling again as variable AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_UNINSTALL_CMD_EXIT_CODE" uninstall fi fi ./NetworkWatcherAgent/NetworkWatcherAgent Register /service /autoStart } update() { echo "Updating Azure Network Watcher Agent" continueOnUpdateFailureConfigured if [ $? -eq 1 ]; then extensionOperationFailed $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE if [ $? -eq 1 ]; then echo "Disabling again as variable AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE was $AZURE_GUEST_AGENT_DISABLE_CMD_EXIT_CODE" disable fi fi install } enable() { echo "Enabling Azure Network Watcher Agent" forceKillOldAgent /etc/init.d/AzureNetworkWatcherAgent start # after agent start the process controller forks child process that # initializing the environmet writing X.status file in # /var/lib/waagent/NWA folder. Unfortunately until environment is received # the status file could not be created since environment contains all the # informaton about destination folder, seq id etc. If X.status file is not # there waagent caused a failure that is shown in UI as deployment problem # even though agent is running successfully. In order to avoid the UI # failure the simple thing for now is to wait for a bit until fork is done, # later when waagent has better logic to handle a status it should be # removed. sleep 7s } GLIBC_MINVERSION="2.11" + GLIBC_MINVERSION=2.11 GLIBC_MINVERSION_MAJOR=2 + GLIBC_MINVERSION_MAJOR=2 GLIBC_MINVERSION_MINOR=11 + GLIBC_MINVERSION_MINOR=11 is_version_supported() { curversion=$1 if [ "$curversion" = "$GLIBC_MINVERSION" ]; then return 1 fi local hasdot=0 local delim=. case $curversion in *$delim*) hasdot=1;; *) hasdot=0;; esac if [ $hasdot -eq 1 ]; then firstval=`echo $curversion | cut -d "." -f 1` if [ $firstval -gt $GLIBC_MINVERSION_MAJOR ]; then return 1 elif [ $firstval -lt $GLIBC_MINVERSION_MAJOR ]; then return 0 e
[+]
..
[-] CommandExecution.log
[edit]
[+]
events
[-] monitor.log
[edit]
[+]
compressed
[-] log_ymd2026-05-08_hms19-09-20_pid24511_i0.txt
[edit]