1
0
mirror of https://github.com/mariadb-corporation/mariadb-columnstore-engine.git synced 2025-08-05 16:15:50 +03:00

updates based on QA testing

This commit is contained in:
David Hill
2017-05-23 16:36:45 -05:00
parent 37ead3c076
commit dfd15b2b13

View File

@@ -42,16 +42,18 @@ helpPrint () {
echo "This is the MariaDB ColumnStore Cluster System Test tool." echo "This is the MariaDB ColumnStore Cluster System Test tool."
echo "" echo ""
echo "It will run a set of test to validate the setup of the MariaDB Columnstore system." echo "It will run a set of test to validate the setup of the MariaDB Columnstore system."
echo "This can be run prior to running MariaDB ColumnStore 'postConfigure' tool to verify" echo "This can be run prior to the install of MariaDB ColumnStore to make sure the"
echo "servers/nodes are configured properly. It should be run as the user of the planned" echo "servers/nodes are configured properly. It should be run as the user of the planned"
echo "install. Meaning if MariaDB ColumnStore is going to be installed as root user," echo "install. Meaning if MariaDB ColumnStore is going to be installed as root user,"
echo "then run from root user. Also the assumption is that the servers/node have be" echo "then run from root user. Also the assumption is that the servers/node have be"
echo "setup based on the Preparing for ColumnStore Installation." echo "setup based on the Preparing for ColumnStore Installation."
echo "It should also be run on the server that is designated as Performance Module #1." echo "It should also be run on the server that is designated as Performance Module #1."
echo "This is the same server where the MariaDB ColumnStore package would be installed"
echo " and where the install script would be executed from, postConfigure."
echo "" echo ""
echo "Additional information on Tool is documented at:" echo "Additional information on Tool is documented at:"
echo "" echo ""
echo "https://mariadb.com/kb/en/mariadb/mariadb-columnstore-cluster-test-tool/" echo "https://mariadb.com/kb/en/mariadb/*****/"
echo "" echo ""
echo "Items that are checked:" echo "Items that are checked:"
echo " Node Ping test" echo " Node Ping test"
@@ -343,7 +345,7 @@ checkRemoteDir()
`sudo rm -f /tmp/*_check > /dev/null 2>&1` `sudo rm -f /tmp/*_check > /dev/null 2>&1`
for ipadd in "${NODE_IPADDRESS[@]}"; do for ipadd in "${NODE_IPADDRESS[@]}"; do
`./remote_command.sh $ipadd $PASSWORD 'sudo rm -f /tmp/*_check > /dev/null 2>&1' 1 > /tmp/remote_command_check_$ipadd 2>&1` `./remote_command.sh $ipadd $PASSWORD 'sudo rm -f /tmp/*_check > /dev/null 2>&1' 1 > /tmp/remote_command_check 2>&1`
done done
if [ "$USER" != "root" ]; then if [ "$USER" != "root" ]; then
@@ -354,10 +356,10 @@ checkRemoteDir()
echo "" echo ""
for ipadd in "${NODE_IPADDRESS[@]}"; do for ipadd in "${NODE_IPADDRESS[@]}"; do
`./remote_command.sh $ipadd $PASSWORD 'touch /tmp/cs_check' 1 > /tmp/remote_command_check_$ipadd 2>&1` `./remote_command.sh $ipadd $PASSWORD 'touch /tmp/cs_check' 1 > /tmp/remote_command_check 2>&1`
rc="$?" rc="$?"
if [ $rc -eq 0 ] || ( [ $rc -eq 2 ] && [ $OS == "suse12" ] ) ; then if [ $rc -eq 0 ] || ( [ $rc -eq 2 ] && [ $OS == "suse12" ] ) ; then
`grep "Permission denied" /tmp/remote_command_check_$ipadd > /dev/null 2>&1` `grep "Permission denied" /tmp/remote_command_check > /dev/null 2>&1`
if [ "$?" -eq 0 ]; then if [ "$?" -eq 0 ]; then
echo "$ipadd Node permission test on /tmp : ${bold}Failed${normal}, change permissions to 777 and re-test" echo "$ipadd Node permission test on /tmp : ${bold}Failed${normal}, change permissions to 777 and re-test"
exit 1 exit 1
@@ -365,15 +367,15 @@ checkRemoteDir()
echo "$ipadd Node permission test on /tmp : Passed" echo "$ipadd Node permission test on /tmp : Passed"
fi fi
else else
echo "Error running remote_command.sh to $ipadd Node, check /tmp/remote_command_check_$ipadd" echo "Error running remote_command.sh to $ipadd Node, check /tmp/remote_command_check"
pass=false pass=false
REPORTPASS=false REPORTPASS=false
fi fi
`./remote_command.sh $ipadd $PASSWORD 'touch /dev/shm/cs_check' 1 > /tmp/remote_command_check_$ipadd 2>&1` `./remote_command.sh $ipadd $PASSWORD 'touch /dev/shm/cs_check' 1 > /tmp/remote_command_check 2>&1`
rc="$?" rc="$?"
if [ $rc -eq 0 ] || ( [ $rc -eq 2 ] && [ $OS == "suse12" ] ) ; then if [ $rc -eq 0 ] || ( [ $rc -eq 2 ] && [ $OS == "suse12" ] ) ; then
`grep "Permission denied" /tmp/remote_command_check_$ipadd > /dev/null 2>&1` `grep "Permission denied" /tmp/remote_command_check > /dev/null 2>&1`
if [ "$?" -eq 0 ]; then if [ "$?" -eq 0 ]; then
echo "$ipadd Node permission test on /dev/shm : ${bold}Failed${normal}, change permissions to 777 and re-test" echo "$ipadd Node permission test on /dev/shm : ${bold}Failed${normal}, change permissions to 777 and re-test"
pass=false pass=false
@@ -382,7 +384,7 @@ checkRemoteDir()
echo "$ipadd Node permission test on /dev/shm : Passed" echo "$ipadd Node permission test on /dev/shm : Passed"
fi fi
else else
echo "Error running remote_command.sh to $ipadd Node, check /tmp/remote_command_check_$ipadd" echo "Error running remote_command.sh to $ipadd Node, check /tmp/remote_command_check"
pass=false pass=false
REPORTPASS=false REPORTPASS=false
fi fi
@@ -407,15 +409,15 @@ checkOS()
pass=true pass=true
for ipadd in "${NODE_IPADDRESS[@]}"; do for ipadd in "${NODE_IPADDRESS[@]}"; do
`./remote_scp_put.sh $ipadd $PASSWORD os_detect.sh 1 > /tmp/remote_scp_put_check_$ipadd 2>&1` `./remote_scp_put.sh $ipadd $PASSWORD os_detect.sh 1 > /tmp/remote_scp_put_check 2>&1`
if [ "$?" -ne 0 ]; then if [ "$?" -ne 0 ]; then
echo "Error running remote_scp_put.sh to $ipadd Node, check /tmp/remote_scp_put_check_$ipadd" echo "Error running remote_scp_put.sh to $ipadd Node, check /tmp/remote_scp_put_check"
else else
`./remote_command.sh $ipadd $PASSWORD './os_detect.sh > /tmp/os_detect 2>&1' 1 > /tmp/remote_command_check_$ipadd` `./remote_command.sh $ipadd $PASSWORD './os_detect.sh > /tmp/os_detect 2>&1' 1 > /tmp/remote_command_check`
rc="$?" rc="$?"
`./remote_scp_get.sh $ipadd $PASSWORD /tmp/os_detect > /tmp/remote_scp_get_check_$ipadd 2>&1` `./remote_scp_get.sh $ipadd $PASSWORD /tmp/os_detect > /tmp/remote_scp_get_check 2>&1`
if [ "$?" -ne 0 ]; then if [ "$?" -ne 0 ]; then
echo "Error running remote_scp_get.sh to $ipadd Node, check /tmp/remote_scp_get_check_$ipadd" echo "Error running remote_scp_get.sh to $ipadd Node, check /tmp/remote_scp_get_check"
else else
remoteOS=`cat os_detect | grep "Operating System name" | cut -f2 -d '"'` remoteOS=`cat os_detect | grep "Operating System name" | cut -f2 -d '"'`
echo "$ipadd Node OS Version : $remoteOS" echo "$ipadd Node OS Version : $remoteOS"
@@ -452,12 +454,12 @@ checkLocale()
pass=true pass=true
for ipadd in "${NODE_IPADDRESS[@]}"; do for ipadd in "${NODE_IPADDRESS[@]}"; do
`./remote_command.sh $ipadd $PASSWORD 'locale | grep LANG= > /tmp/locale_check 2>&1' 1 > /tmp/remote_command_check_$ipadd` `./remote_command.sh $ipadd $PASSWORD 'locale | grep LANG= > /tmp/locale_check 2>&1' 1 > /tmp/remote_command_check`
rc="$?" rc="$?"
if [ $rc -eq 0 ] || ( [ $rc -eq 2 ] && [ $OS == "suse12" ] ) ; then if [ $rc -eq 0 ] || ( [ $rc -eq 2 ] && [ $OS == "suse12" ] ) ; then
`./remote_scp_get.sh $ipadd $PASSWORD /tmp/locale_check > /tmp/remote_scp_get_check_$ipadd 2>&1` `./remote_scp_get.sh $ipadd $PASSWORD /tmp/locale_check > /tmp/remote_scp_get_check 2>&1`
if [ "$?" -ne 0 ]; then if [ "$?" -ne 0 ]; then
echo "Error running remote_scp_get.sh to $ipadd Node, check /tmp/remote_scp_get_check_$ipadd" echo "Error running remote_scp_get.sh to $ipadd Node, check /tmp/remote_scp_get_check"
else else
echo "$ipadd Node Locale : `cat locale_check`" echo "$ipadd Node Locale : `cat locale_check`"
`diff /tmp/locale_check locale_check > /dev/null 2>&1` `diff /tmp/locale_check locale_check > /dev/null 2>&1`
@@ -469,7 +471,7 @@ checkLocale()
`rm -f locale_check` `rm -f locale_check`
fi fi
else else
echo "Error running remote_command.sh to $ipadd Node, check /tmp/remote_command_check_$ipadd" echo "Error running remote_command.sh to $ipadd Node, check /tmp/remote_command_check"
pass=false pass=false
REPORTPASS=false REPORTPASS=false
fi fi
@@ -504,7 +506,7 @@ checkSELINUX()
fi fi
for ipadd in "${NODE_IPADDRESS[@]}"; do for ipadd in "${NODE_IPADDRESS[@]}"; do
`./remote_scp_get.sh $ipadd $PASSWORD /etc/selinux/config > /tmp/remote_scp_get_check_$ipadd 2>&1` `./remote_scp_get.sh $ipadd $PASSWORD /etc/selinux/config > /tmp/remote_scp_get_check 2>&1`
if [ "$?" -ne 0 ]; then if [ "$?" -ne 0 ]; then
echo "$ipadd Node SELINUX setting is Not Enabled" echo "$ipadd Node SELINUX setting is Not Enabled"
else else
@@ -570,14 +572,14 @@ checkFirewalls()
# 'sysconfig not on remote node # 'sysconfig not on remote node
for firewall in "${FIREWALL_LIST[@]}"; do for firewall in "${FIREWALL_LIST[@]}"; do
pass=true pass=true
`./remote_command.sh $ipadd $PASSWORD "service '$firewall' status > /tmp/firewall_check 2>&1" 1 > /tmp/remote_command_check_$ipadd` `./remote_command.sh $ipadd $PASSWORD "service '$firewall' status > /tmp/firewall_check 2>&1" 1 > /tmp/remote_command_check`
if [ "$?" -eq 0 ]; then if [ "$?" -eq 0 ]; then
echo "${bold}Failed${normal}, $ipadd Node $firewall service is Active, please disable" echo "${bold}Failed${normal}, $ipadd Node $firewall service is Active, please disable"
pass=false pass=false
fpass=false fpass=false
REPORTPASS=false REPORTPASS=false
else else
`./remote_command.sh $ipadd $PASSWORD "systemctl status '$firewall' > /tmp/firewall_check 2>&1" 1 > /tmp/remote_command_check_$ipadd` `./remote_command.sh $ipadd $PASSWORD "systemctl status '$firewall' > /tmp/firewall_check 2>&1" 1 > /tmp/remote_command_check`
if [ "$?" -eq 0 ]; then if [ "$?" -eq 0 ]; then
echo "${bold}Failed${normal}, $ipadd Node $firewall service is Active, please disable" echo "${bold}Failed${normal}, $ipadd Node $firewall service is Active, please disable"
pass=false pass=false
@@ -602,14 +604,14 @@ checkFirewalls()
# rcSuSEfirewall2 check # rcSuSEfirewall2 check
# #
echo "" echo ""
echo "** Run rcSuSEfirewall2 check - Service should to be Inactive on all nodes" echo "** Run rcSuSEfirewall2 check - Service should to be disabled on all nodes"
echo "" echo ""
pass=true pass=true
#check local IPTABLES #check local IPTABLES
`/sbin/rcSuSEfirewall2 status > /tmp/rcSuSEfirewall2_check 2>&1` `/sbin/rcSuSEfirewall2 status > /tmp/rcSuSEfirewall2_check 2>&1`
if [ "$?" -eq 0 ]; then if [ "$?" -eq 0 ]; then
echo "${bold}Failed${normal}, Local Node rcSuSEfirewall2 service is Active, please disable" echo "${bold}Failed${normal}, Local Node rcSuSEfirewall2 service is Enabled, please disable"
pass=false pass=false
REPORTPASS=false REPORTPASS=false
else else
@@ -617,10 +619,10 @@ checkFirewalls()
fi fi
for ipadd in "${NODE_IPADDRESS[@]}"; do for ipadd in "${NODE_IPADDRESS[@]}"; do
`./remote_command.sh $ipadd $PASSWORD '/sbin/rcSuSEfirewall2 status > /tmp/rcSuSEfirewall2_check 2>&1' 1 > /tmp/remote_command_check_$ipadd` `./remote_command.sh $ipadd $PASSWORD '/sbin/rcSuSEfirewall2 status > /tmp/rcSuSEfirewall2_check 2>&1' 1 > /tmp/remote_command_check`
rc="$?" rc="$?"
if [ $rc -eq 0 ] ; then if [ $rc -eq 0 ] ; then
echo "${bold}Failed${normal}, $ipadd Node rcSuSEfirewall2 service is Active, please disable" echo "${bold}Failed${normal}, $ipadd Node rcSuSEfirewall2 service is Enabled, please disable"
pass=false pass=false
REPORTPASS=false REPORTPASS=false
else else
@@ -679,9 +681,9 @@ checkTime()
pass=false pass=false
REPORTPASS=false REPORTPASS=false
else else
`./remote_scp_get.sh $ipadd $PASSWORD /tmp/time_check > /tmp/remote_scp_get_check_$ipadd 2>&1` `./remote_scp_get.sh $ipadd $PASSWORD /tmp/time_check > /tmp/remote_scp_get_check 2>&1`
if [ "$?" -ne 0 ]; then if [ "$?" -ne 0 ]; then
echo "Error running remote_scp_get.sh to $ipadd Node, check /tmp/remote_scp_get_check_$ipadd" echo "Error running remote_scp_get.sh to $ipadd Node, check /tmp/remote_scp_get_check"
else else
remoteTime=`cat time_check` remoteTime=`cat time_check`
timeDiff=`echo "$(($remoteTime-$localTime))"` timeDiff=`echo "$(($remoteTime-$localTime))"`
@@ -712,7 +714,7 @@ checkPackages()
echo "** Run MariaDB ColumnStore Dependent Package Check" echo "** Run MariaDB ColumnStore Dependent Package Check"
echo "" echo ""
declare -a CENTOS_PKG=("boost" "expect" "perl" "perl-DBI" "openssl" "zlib" "file" "sudo" "perl-DBD-MySQL" "libaio" "rsync" "snappy" "net-tools") declare -a CENTOS_PKG=("expect" "perl" "perl-DBI" "openssl" "zlib" "file" "sudo" "libaio" "rsync" "snappy" "net-tools" "perl-DBD-MySQL")
if [ "$OS" == "centos6" ] || [ "$OS" == "centos7" ]; then if [ "$OS" == "centos6" ] || [ "$OS" == "centos7" ]; then
if [ ! `which yum 2>/dev/null` ] ; then if [ ! `which yum 2>/dev/null` ] ; then
@@ -754,14 +756,14 @@ checkPackages()
for ipadd in "${NODE_IPADDRESS[@]}"; do for ipadd in "${NODE_IPADDRESS[@]}"; do
for PKG in "${CENTOS_PKG[@]}"; do for PKG in "${CENTOS_PKG[@]}"; do
if [ $OS == "centos6" ] && [ $PKG == "boost" ]; then if [ $OS == "centos6" ] && [ $PKG == "boost" ]; then
`./remote_command.sh $ipadd $PASSWORD 'ls /usr/lib/libboost_regex.so > /dev/null 2>&1' 1 > /tmp/remote_command_check_$ipadd 2>&1` `./remote_command.sh $ipadd $PASSWORD 'ls /usr/lib/libboost_regex.so > /dev/null 2>&1' 1 > /tmp/remote_command_check 2>&1`
if [ $? -ne 0 ] ; then if [ $? -ne 0 ] ; then
echo "${bold}Failed${normal}, $ipadd Node ${bold}boost libraries${normal} not installed" echo "${bold}Failed${normal}, $ipadd Node ${bold}boost libraries${normal} not installed"
pass=false pass=false
REPORTPASS=false REPORTPASS=false
fi fi
else else
`./remote_command.sh $ipadd $PASSWORD "yum list installed '$PKG' > /tmp/pkg_check 2>&1" 1 > /tmp/remote_command_check_$ipadd 2>&1` `./remote_command.sh $ipadd $PASSWORD "yum list installed '$PKG' > /tmp/pkg_check 2>&1" 1 > /tmp/remote_command_check 2>&1`
rc="$?" rc="$?"
if [ $rc -eq 2 ] ; then if [ $rc -eq 2 ] ; then
echo "${bold}Failed${normal}, $ipadd Node, 'yum' not installed" echo "${bold}Failed${normal}, $ipadd Node, 'yum' not installed"
@@ -787,7 +789,7 @@ checkPackages()
fi fi
fi fi
declare -a SUSE_PKG=("boost-devel" "expect" "perl" "perl-DBI" "openssl" "file" "sudo" "libaio1" "rsync" "libsnappy1" "net-tools") declare -a SUSE_PKG=("boost-devel" "expect" "perl" "perl-DBI" "openssl" "file" "sudo" "libaio1" "rsync" "libsnappy1" "net-tools" "perl-DBD-MySQL")
if [ "$OS" == "suse12" ]; then if [ "$OS" == "suse12" ]; then
if [ ! `which rpm 2>/dev/null` ] ; then if [ ! `which rpm 2>/dev/null` ] ; then
@@ -819,7 +821,7 @@ checkPackages()
if [ "$IPADDRESSES" != "" ]; then if [ "$IPADDRESSES" != "" ]; then
for ipadd in "${NODE_IPADDRESS[@]}"; do for ipadd in "${NODE_IPADDRESS[@]}"; do
for PKG in "${SUSE_PKG[@]}"; do for PKG in "${SUSE_PKG[@]}"; do
`./remote_command.sh $ipadd $PASSWORD "rpm -qi '$PKG' > /tmp/pkg_check 2>&1" 1 > /tmp/remote_command_check_$ipadd 2>&1` `./remote_command.sh $ipadd $PASSWORD "rpm -qi '$PKG' > /tmp/pkg_check 2>&1" 1 > /tmp/remote_command_check 2>&1`
rc="$?" rc="$?"
if [ $rc -ne 0 ] ; then if [ $rc -ne 0 ] ; then
echo "${bold}Failed${normal}, $ipadd Node package ${bold}${PKG}${normal} is not installed, please install" echo "${bold}Failed${normal}, $ipadd Node package ${bold}${PKG}${normal} is not installed, please install"
@@ -839,7 +841,7 @@ checkPackages()
fi fi
fi fi
declare -a UBUNTU_PKG=("libboost-all-dev" "expect" "libdbi-perl" "perl" "openssl" "libreadline-dev" "rsync" "snappy" "net-tools") declare -a UBUNTU_PKG=("libboost-all-dev" "expect" "libdbi-perl" "perl" "openssl" "file" "sudo" "libreadline-dev" "rsync" "snappy" "net-tools" "libdbd-mysql-perl")
if [ "$OS" == "ubuntu16" ] ; then if [ "$OS" == "ubuntu16" ] ; then
if [ ! `which dpkg 2>/dev/null` ] ; then if [ ! `which dpkg 2>/dev/null` ] ; then
@@ -871,14 +873,12 @@ checkPackages()
if [ "$IPADDRESSES" != "" ]; then if [ "$IPADDRESSES" != "" ]; then
for ipadd in "${NODE_IPADDRESS[@]}"; do for ipadd in "${NODE_IPADDRESS[@]}"; do
for PKG in "${UBUNTU_PKG[@]}"; do for PKG in "${UBUNTU_PKG[@]}"; do
`./remote_command.sh $ipadd $PASSWORD "dpkg -s '$PKG' > /tmp/pkg_check 2>&1" 1 > /tmp/remote_command_check_$ipadd 2>&1` `./remote_command.sh $ipadd $PASSWORD "dpkg -s '$PKG' > /tmp/pkg_check 2>&1" 1 > /tmp/remote_command_check 2>&1`
rc="$?" `./remote_scp_get.sh $ipadd $PASSWORD /tmp/pkg_check > /tmp/remote_scp_get_check 2>&1`
if [ $rc -eq 0 ] ; then
`./remote_scp_get.sh $ipadd $PASSWORD /tmp/pkg_check > /tmp/remote_scp_get_check_$ipadd 2>&1`
if [ "$?" -ne 0 ]; then if [ "$?" -ne 0 ]; then
echo "Error running remote_scp_get.sh to $ipadd Node, check /tmp/remote_scp_get_check_$ipadd" echo "Error running remote_scp_get.sh to $ipadd Node, check /tmp/remote_scp_get_check"
else else
`cat /tmp/remote_command_check_$ipadd | grep 'command not found' > /dev/null 2>&1` `cat /tmp/remote_command_check | grep 'command not found' > /dev/null 2>&1`
if [ "$?" -eq 0 ]; then if [ "$?" -eq 0 ]; then
echo "${bold}Failed${normal}, $ipadd Node ${bold}dpkg${normal} package not installed" echo "${bold}Failed${normal}, $ipadd Node ${bold}dpkg${normal} package not installed"
pass=false pass=false
@@ -888,16 +888,16 @@ checkPackages()
if [ "$?" -ne 0 ]; then if [ "$?" -ne 0 ]; then
echo "${bold}Failed${normal}, $ipadd Node package ${bold}${PKG}${normal} is not installed, please install" echo "${bold}Failed${normal}, $ipadd Node package ${bold}${PKG}${normal} is not installed, please install"
pass=false pass=false
else
`cat pkg_check | grep 'not installed' > /dev/null 2>&1`
if [ "$?" -ne 0 ]; then
echo "${bold}Failed${normal}, $ipadd Node package ${bold}${PKG}${normal} is not installed, please install"
pass=false
fi
fi fi
`rm -f pkg_check` `rm -f pkg_check`
fi fi
fi
else
echo "Error running remote_command.sh to $ipadd Node, check /tmp/remote_command_check_$ipadd"
pass=false
fi
done
if $pass; then if $pass; then
echo "$ipadd Node - Passed, all dependency packages are installed" echo "$ipadd Node - Passed, all dependency packages are installed"
@@ -910,7 +910,7 @@ checkPackages()
fi fi
fi fi
declare -a DEBIAN_PKG=("libboost-all-dev" "expect" "libdbi-perl" "perl" "openssl" "libreadline-dev" "rsync" "libsnappy1" "net-tools") declare -a DEBIAN_PKG=("libboost-all-dev" "expect" "libdbi-perl" "perl" "openssl" "file" "sudo" "libreadline-dev" "rsync" "libsnappy1" "net-tools" "libdbd-mysql-perl")
if [ "$OS" == "debian8" ]; then if [ "$OS" == "debian8" ]; then
if [ ! `which dpkg 2>/dev/null` ] ; then if [ ! `which dpkg 2>/dev/null` ] ; then
@@ -942,14 +942,12 @@ checkPackages()
if [ "$IPADDRESSES" != "" ]; then if [ "$IPADDRESSES" != "" ]; then
for ipadd in "${NODE_IPADDRESS[@]}"; do for ipadd in "${NODE_IPADDRESS[@]}"; do
for PKG in "${DEBIAN_PKG[@]}"; do for PKG in "${DEBIAN_PKG[@]}"; do
`./remote_command.sh $ipadd $PASSWORD "dpkg -s '$PKG' > /tmp/pkg_check 2>&1" 1 > /tmp/remote_command_check_$ipadd 2>&1` `./remote_command.sh $ipadd $PASSWORD "dpkg -s '$PKG' > /tmp/pkg_check 2>&1" 1 > /tmp/remote_command_check 2>&1`
rc="$?" `./remote_scp_get.sh $ipadd $PASSWORD /tmp/pkg_check > /tmp/remote_scp_get_check 2>&1`
if [ $rc -eq 0 ] ; then
`./remote_scp_get.sh $ipadd $PASSWORD /tmp/pkg_check > /tmp/remote_scp_get_check_$ipadd 2>&1`
if [ "$?" -ne 0 ]; then if [ "$?" -ne 0 ]; then
echo "Error running remote_scp_get.sh to $ipadd Node, check /tmp/remote_scp_get_check_$ipadd" echo "Error running remote_scp_get.sh to $ipadd Node, check /tmp/remote_scp_get_check"
else else
`cat /tmp/remote_command_check_$ipadd | grep 'command not found' > /dev/null 2>&1` `cat /tmp/remote_command_check | grep 'command not found' > /dev/null 2>&1`
if [ "$?" -eq 0 ]; then if [ "$?" -eq 0 ]; then
echo "${bold}Failed${normal}, $ipadd Node ${bold}dpkg${normal} package not installed" echo "${bold}Failed${normal}, $ipadd Node ${bold}dpkg${normal} package not installed"
pass=false pass=false
@@ -959,15 +957,16 @@ checkPackages()
if [ "$?" -ne 0 ]; then if [ "$?" -ne 0 ]; then
echo "${bold}Failed${normal}, $ipadd Node package ${bold}${PKG}${normal} is not installed, please install" echo "${bold}Failed${normal}, $ipadd Node package ${bold}${PKG}${normal} is not installed, please install"
pass=false pass=false
else
`cat pkg_check | grep 'not installed' > /dev/null 2>&1`
if [ "$?" -ne 0 ]; then
echo "${bold}Failed${normal}, $ipadd Node package ${bold}${PKG}${normal} is not installed, please install"
pass=false
fi
fi fi
`rm -f pkg_check` `rm -f pkg_check`
fi fi
fi fi
else
echo "Error running remote_command.sh to $ipadd Node, check /tmp/remote_command_check_$ipadd"
pass=false
fi
done done
if $pass; then if $pass; then