=== RUN kuttl harness.go:464: starting setup harness.go:255: running tests using configured kubeconfig. harness.go:278: Successful connection to cluster at: https://34.42.200.209 harness.go:363: running tests harness.go:75: going to run test suite with timeout of 180 seconds for each step harness.go:375: testsuite: e2e-tests/tests has 34 tests === RUN kuttl/harness === RUN kuttl/harness/gr-haproxy === PAUSE kuttl/harness/gr-haproxy === CONT kuttl/harness/gr-haproxy logger.go:42: 01:51:00 | gr-haproxy | Creating namespace: kuttl-test-artistic-swift logger.go:42: 01:51:00 | gr-haproxy/0-deploy-operator | starting test step 0-deploy-operator logger.go:42: 01:51:00 | gr-haproxy/0-deploy-operator | running command: [sh -c set -o errexit set -o xtrace source ../../functions init_temp_dir # do this only in the first TestStep deploy_operator deploy_non_tls_cluster_secrets deploy_tls_cluster_secrets deploy_client] logger.go:42: 01:51:00 | gr-haproxy/0-deploy-operator | + source ../../functions logger.go:42: 01:51:00 | gr-haproxy/0-deploy-operator | +++ realpath ../../.. logger.go:42: 01:51:00 | gr-haproxy/0-deploy-operator | ++ ROOT_REPO=/mnt/jenkins/workspace/cloud-ps-operator_PR-753 logger.go:42: 01:51:00 | gr-haproxy/0-deploy-operator | ++++ pwd logger.go:42: 01:51:00 | gr-haproxy/0-deploy-operator | +++ basename /mnt/jenkins/workspace/cloud-ps-operator_PR-753/e2e-tests/tests/gr-haproxy logger.go:42: 01:51:00 | gr-haproxy/0-deploy-operator | ++ test_name=gr-haproxy logger.go:42: 01:51:00 | gr-haproxy/0-deploy-operator | ++ source /mnt/jenkins/workspace/cloud-ps-operator_PR-753/e2e-tests/vars.sh logger.go:42: 01:51:00 | gr-haproxy/0-deploy-operator | +++ export ROOT_REPO=/mnt/jenkins/workspace/cloud-ps-operator_PR-753 logger.go:42: 01:51:00 | gr-haproxy/0-deploy-operator | +++ ROOT_REPO=/mnt/jenkins/workspace/cloud-ps-operator_PR-753 logger.go:42: 01:51:00 | gr-haproxy/0-deploy-operator | +++ export DEPLOY_DIR=/mnt/jenkins/workspace/cloud-ps-operator_PR-753/deploy logger.go:42: 01:51:00 | gr-haproxy/0-deploy-operator | +++ DEPLOY_DIR=/mnt/jenkins/workspace/cloud-ps-operator_PR-753/deploy logger.go:42: 01:51:00 | gr-haproxy/0-deploy-operator | +++ export TESTS_DIR=/mnt/jenkins/workspace/cloud-ps-operator_PR-753/e2e-tests logger.go:42: 01:51:00 | gr-haproxy/0-deploy-operator | +++ TESTS_DIR=/mnt/jenkins/workspace/cloud-ps-operator_PR-753/e2e-tests logger.go:42: 01:51:00 | gr-haproxy/0-deploy-operator | +++ export TESTS_CONFIG_DIR=/mnt/jenkins/workspace/cloud-ps-operator_PR-753/e2e-tests/conf logger.go:42: 01:51:00 | gr-haproxy/0-deploy-operator | +++ TESTS_CONFIG_DIR=/mnt/jenkins/workspace/cloud-ps-operator_PR-753/e2e-tests/conf logger.go:42: 01:51:00 | gr-haproxy/0-deploy-operator | +++ export TEMP_DIR=/tmp/kuttl/ps/gr-haproxy logger.go:42: 01:51:00 | gr-haproxy/0-deploy-operator | +++ TEMP_DIR=/tmp/kuttl/ps/gr-haproxy logger.go:42: 01:51:00 | gr-haproxy/0-deploy-operator | ++++ git rev-parse --abbrev-ref HEAD logger.go:42: 01:51:00 | gr-haproxy/0-deploy-operator | +++ export GIT_BRANCH=PR-753 logger.go:42: 01:51:00 | gr-haproxy/0-deploy-operator | +++ GIT_BRANCH=PR-753 logger.go:42: 01:51:00 | gr-haproxy/0-deploy-operator | +++ export VERSION=PR-753-8f2a8b69 logger.go:42: 01:51:00 | gr-haproxy/0-deploy-operator | +++ VERSION=PR-753-8f2a8b69 logger.go:42: 01:51:00 | gr-haproxy/0-deploy-operator | +++ export IMAGE=perconalab/percona-server-mysql-operator:PR-753-8f2a8b69 logger.go:42: 01:51:00 | gr-haproxy/0-deploy-operator | +++ IMAGE=perconalab/percona-server-mysql-operator:PR-753-8f2a8b69 logger.go:42: 01:51:00 | gr-haproxy/0-deploy-operator | +++ export IMAGE_MYSQL=perconalab/percona-server-mysql-operator:main-psmysql logger.go:42: 01:51:00 | gr-haproxy/0-deploy-operator | +++ IMAGE_MYSQL=perconalab/percona-server-mysql-operator:main-psmysql logger.go:42: 01:51:00 | gr-haproxy/0-deploy-operator | +++ export IMAGE_BACKUP=perconalab/percona-server-mysql-operator:main-backup logger.go:42: 01:51:00 | gr-haproxy/0-deploy-operator | +++ IMAGE_BACKUP=perconalab/percona-server-mysql-operator:main-backup logger.go:42: 01:51:00 | gr-haproxy/0-deploy-operator | +++ export IMAGE_ORCHESTRATOR=perconalab/percona-server-mysql-operator:main-orchestrator logger.go:42: 01:51:00 | gr-haproxy/0-deploy-operator | +++ IMAGE_ORCHESTRATOR=perconalab/percona-server-mysql-operator:main-orchestrator logger.go:42: 01:51:00 | gr-haproxy/0-deploy-operator | +++ export IMAGE_ROUTER=perconalab/percona-server-mysql-operator:main-router logger.go:42: 01:51:00 | gr-haproxy/0-deploy-operator | +++ IMAGE_ROUTER=perconalab/percona-server-mysql-operator:main-router logger.go:42: 01:51:00 | gr-haproxy/0-deploy-operator | +++ export IMAGE_TOOLKIT=perconalab/percona-server-mysql-operator:main-toolkit logger.go:42: 01:51:00 | gr-haproxy/0-deploy-operator | +++ IMAGE_TOOLKIT=perconalab/percona-server-mysql-operator:main-toolkit logger.go:42: 01:51:00 | gr-haproxy/0-deploy-operator | +++ export IMAGE_HAPROXY=perconalab/percona-server-mysql-operator:main-haproxy logger.go:42: 01:51:00 | gr-haproxy/0-deploy-operator | +++ IMAGE_HAPROXY=perconalab/percona-server-mysql-operator:main-haproxy logger.go:42: 01:51:00 | gr-haproxy/0-deploy-operator | +++ export PMM_SERVER_VERSION=9.9.9 logger.go:42: 01:51:00 | gr-haproxy/0-deploy-operator | +++ PMM_SERVER_VERSION=9.9.9 logger.go:42: 01:51:00 | gr-haproxy/0-deploy-operator | +++ export IMAGE_PMM_CLIENT=perconalab/pmm-client:dev-latest logger.go:42: 01:51:00 | gr-haproxy/0-deploy-operator | +++ IMAGE_PMM_CLIENT=perconalab/pmm-client:dev-latest logger.go:42: 01:51:00 | gr-haproxy/0-deploy-operator | +++ export IMAGE_PMM_SERVER=perconalab/pmm-server:dev-latest logger.go:42: 01:51:00 | gr-haproxy/0-deploy-operator | +++ IMAGE_PMM_SERVER=perconalab/pmm-server:dev-latest logger.go:42: 01:51:00 | gr-haproxy/0-deploy-operator | +++ export CERT_MANAGER_VER=1.15.1 logger.go:42: 01:51:00 | gr-haproxy/0-deploy-operator | +++ CERT_MANAGER_VER=1.15.1 logger.go:42: 01:51:00 | gr-haproxy/0-deploy-operator | ++++ which gdate logger.go:42: 01:51:00 | gr-haproxy/0-deploy-operator | which: no gdate in (/mnt/jenkins/workspace/cloud-ps-operator_PR-753/bin/:/home/ec2-user/.krew/bin:/usr/local/bin:/usr/bin) logger.go:42: 01:51:00 | gr-haproxy/0-deploy-operator | ++++ which date logger.go:42: 01:51:00 | gr-haproxy/0-deploy-operator | +++ date=/usr/bin/date logger.go:42: 01:51:00 | gr-haproxy/0-deploy-operator | +++ command -v oc logger.go:42: 01:51:00 | gr-haproxy/0-deploy-operator | +++ kubectl get nodes logger.go:42: 01:51:00 | gr-haproxy/0-deploy-operator | +++ grep '^minikube' logger.go:42: 01:51:01 | gr-haproxy/0-deploy-operator | + init_temp_dir logger.go:42: 01:51:01 | gr-haproxy/0-deploy-operator | + rm -rf /tmp/kuttl/ps/gr-haproxy logger.go:42: 01:51:01 | gr-haproxy/0-deploy-operator | + mkdir -p /tmp/kuttl/ps/gr-haproxy logger.go:42: 01:51:01 | gr-haproxy/0-deploy-operator | + deploy_operator logger.go:42: 01:51:01 | gr-haproxy/0-deploy-operator | + destroy_operator logger.go:42: 01:51:01 | gr-haproxy/0-deploy-operator | + kubectl -n ps-operator delete deployment percona-server-mysql-operator --force --grace-period=0 logger.go:42: 01:51:01 | gr-haproxy/0-deploy-operator | Warning: Immediate deletion does not wait for confirmation that the running resource has been terminated. The resource may continue to run on the cluster indefinitely. logger.go:42: 01:51:01 | gr-haproxy/0-deploy-operator | Error from server (NotFound): deployments.apps "percona-server-mysql-operator" not found logger.go:42: 01:51:01 | gr-haproxy/0-deploy-operator | + true logger.go:42: 01:51:01 | gr-haproxy/0-deploy-operator | + [[ -n ps-operator ]] logger.go:42: 01:51:01 | gr-haproxy/0-deploy-operator | + kubectl delete namespace ps-operator --force --grace-period=0 logger.go:42: 01:51:01 | gr-haproxy/0-deploy-operator | Warning: Immediate deletion does not wait for confirmation that the running resource has been terminated. The resource may continue to run on the cluster indefinitely. logger.go:42: 01:51:01 | gr-haproxy/0-deploy-operator | Error from server (NotFound): namespaces "ps-operator" not found logger.go:42: 01:51:01 | gr-haproxy/0-deploy-operator | + true logger.go:42: 01:51:01 | gr-haproxy/0-deploy-operator | + [[ -n ps-operator ]] logger.go:42: 01:51:01 | gr-haproxy/0-deploy-operator | + create_namespace ps-operator logger.go:42: 01:51:01 | gr-haproxy/0-deploy-operator | + local namespace=ps-operator logger.go:42: 01:51:01 | gr-haproxy/0-deploy-operator | + [[ -n '' ]] logger.go:42: 01:51:01 | gr-haproxy/0-deploy-operator | + kubectl delete namespace ps-operator --ignore-not-found logger.go:42: 01:51:02 | gr-haproxy/0-deploy-operator | + kubectl wait --for=delete namespace ps-operator logger.go:42: 01:51:02 | gr-haproxy/0-deploy-operator | + kubectl create namespace ps-operator logger.go:42: 01:51:03 | gr-haproxy/0-deploy-operator | namespace/ps-operator created logger.go:42: 01:51:03 | gr-haproxy/0-deploy-operator | + kubectl -n ps-operator apply --server-side --force-conflicts -f /mnt/jenkins/workspace/cloud-ps-operator_PR-753/deploy/crd.yaml logger.go:42: 01:51:03 | gr-haproxy/0-deploy-operator | customresourcedefinition.apiextensions.k8s.io/perconaservermysqlbackups.ps.percona.com serverside-applied logger.go:42: 01:51:04 | gr-haproxy/0-deploy-operator | customresourcedefinition.apiextensions.k8s.io/perconaservermysqlrestores.ps.percona.com serverside-applied logger.go:42: 01:51:05 | gr-haproxy/0-deploy-operator | customresourcedefinition.apiextensions.k8s.io/perconaservermysqls.ps.percona.com serverside-applied logger.go:42: 01:51:05 | gr-haproxy/0-deploy-operator | + '[' -n ps-operator ']' logger.go:42: 01:51:05 | gr-haproxy/0-deploy-operator | + kubectl -n ps-operator apply -f /mnt/jenkins/workspace/cloud-ps-operator_PR-753/deploy/cw-rbac.yaml logger.go:42: 01:51:06 | gr-haproxy/0-deploy-operator | serviceaccount/percona-server-mysql-operator created logger.go:42: 01:51:06 | gr-haproxy/0-deploy-operator | role.rbac.authorization.k8s.io/percona-server-mysql-operator-leaderelection created logger.go:42: 01:51:06 | gr-haproxy/0-deploy-operator | clusterrole.rbac.authorization.k8s.io/percona-server-mysql-operator unchanged logger.go:42: 01:51:07 | gr-haproxy/0-deploy-operator | rolebinding.rbac.authorization.k8s.io/percona-server-mysql-operator-leaderelection created logger.go:42: 01:51:07 | gr-haproxy/0-deploy-operator | clusterrolebinding.rbac.authorization.k8s.io/percona-server-mysql-operator unchanged logger.go:42: 01:51:07 | gr-haproxy/0-deploy-operator | + yq eval '(select(documentIndex==1).spec.template.spec.containers[] | select(.name=="manager").env[] | select(.name=="DISABLE_TELEMETRY").value) = "true"' logger.go:42: 01:51:07 | gr-haproxy/0-deploy-operator | + yq eval '(select(documentIndex==1).spec.template.spec.containers[] | select(.name=="manager").env[] | select(.name=="LOG_LEVEL").value) = "DEBUG"' logger.go:42: 01:51:07 | gr-haproxy/0-deploy-operator | + kubectl -n ps-operator apply -f - logger.go:42: 01:51:07 | gr-haproxy/0-deploy-operator | ++ printf 'select(documentIndex==1).spec.template.spec.containers[0].image="%s"' perconalab/percona-server-mysql-operator:PR-753-8f2a8b69 logger.go:42: 01:51:07 | gr-haproxy/0-deploy-operator | + yq eval 'select(documentIndex==1).spec.template.spec.containers[0].image="perconalab/percona-server-mysql-operator:PR-753-8f2a8b69"' /mnt/jenkins/workspace/cloud-ps-operator_PR-753/deploy/cw-operator.yaml logger.go:42: 01:51:08 | gr-haproxy/0-deploy-operator | configmap/percona-server-mysql-operator-config created logger.go:42: 01:51:09 | gr-haproxy/0-deploy-operator | deployment.apps/percona-server-mysql-operator created logger.go:42: 01:51:09 | gr-haproxy/0-deploy-operator | + deploy_non_tls_cluster_secrets logger.go:42: 01:51:09 | gr-haproxy/0-deploy-operator | + kubectl -n kuttl-test-artistic-swift apply -f /mnt/jenkins/workspace/cloud-ps-operator_PR-753/e2e-tests/conf/secrets.yaml logger.go:42: 01:51:10 | gr-haproxy/0-deploy-operator | secret/test-secrets created logger.go:42: 01:51:10 | gr-haproxy/0-deploy-operator | + deploy_tls_cluster_secrets logger.go:42: 01:51:10 | gr-haproxy/0-deploy-operator | + kubectl -n kuttl-test-artistic-swift apply -f /mnt/jenkins/workspace/cloud-ps-operator_PR-753/e2e-tests/conf/ssl-secret.yaml logger.go:42: 01:51:11 | gr-haproxy/0-deploy-operator | secret/test-ssl created logger.go:42: 01:51:11 | gr-haproxy/0-deploy-operator | + deploy_client logger.go:42: 01:51:11 | gr-haproxy/0-deploy-operator | + kubectl -n kuttl-test-artistic-swift apply -f /mnt/jenkins/workspace/cloud-ps-operator_PR-753/e2e-tests/conf/client.yaml logger.go:42: 01:51:12 | gr-haproxy/0-deploy-operator | pod/mysql-client created logger.go:42: 01:51:12 | gr-haproxy/0-deploy-operator | running command: [sh -c kubectl assert exist-enhanced deployment percona-server-mysql-operator -n ${OPERATOR_NS:-$NAMESPACE} --field-selector status.readyReplicas=1] logger.go:42: 01:51:12 | gr-haproxy/0-deploy-operator | ASSERT deployment percona-server-mysql-operator matching field criteria 'status.readyReplicas=1' should exist. logger.go:42: 01:51:12 | gr-haproxy/0-deploy-operator | ASSERT FAIL Resource(s) not found. logger.go:42: 01:51:14 | gr-haproxy/0-deploy-operator | running command: [sh -c kubectl assert exist-enhanced deployment percona-server-mysql-operator -n ${OPERATOR_NS:-$NAMESPACE} --field-selector status.readyReplicas=1] logger.go:42: 01:51:14 | gr-haproxy/0-deploy-operator | ASSERT deployment percona-server-mysql-operator matching field criteria 'status.readyReplicas=1' should exist. logger.go:42: 01:51:14 | gr-haproxy/0-deploy-operator | ASSERT FAIL Resource(s) not found. logger.go:42: 01:51:15 | gr-haproxy/0-deploy-operator | running command: [sh -c kubectl assert exist-enhanced deployment percona-server-mysql-operator -n ${OPERATOR_NS:-$NAMESPACE} --field-selector status.readyReplicas=1] logger.go:42: 01:51:15 | gr-haproxy/0-deploy-operator | ASSERT deployment percona-server-mysql-operator matching field criteria 'status.readyReplicas=1' should exist. logger.go:42: 01:51:16 | gr-haproxy/0-deploy-operator | ASSERT FAIL Resource(s) not found. logger.go:42: 01:51:17 | gr-haproxy/0-deploy-operator | running command: [sh -c kubectl assert exist-enhanced deployment percona-server-mysql-operator -n ${OPERATOR_NS:-$NAMESPACE} --field-selector status.readyReplicas=1] logger.go:42: 01:51:17 | gr-haproxy/0-deploy-operator | ASSERT deployment percona-server-mysql-operator matching field criteria 'status.readyReplicas=1' should exist. logger.go:42: 01:51:17 | gr-haproxy/0-deploy-operator | ASSERT FAIL Resource(s) not found. logger.go:42: 01:51:19 | gr-haproxy/0-deploy-operator | running command: [sh -c kubectl assert exist-enhanced deployment percona-server-mysql-operator -n ${OPERATOR_NS:-$NAMESPACE} --field-selector status.readyReplicas=1] logger.go:42: 01:51:19 | gr-haproxy/0-deploy-operator | ASSERT deployment percona-server-mysql-operator matching field criteria 'status.readyReplicas=1' should exist. logger.go:42: 01:51:19 | gr-haproxy/0-deploy-operator | ASSERT FAIL Resource(s) not found. logger.go:42: 01:51:20 | gr-haproxy/0-deploy-operator | running command: [sh -c kubectl assert exist-enhanced deployment percona-server-mysql-operator -n ${OPERATOR_NS:-$NAMESPACE} --field-selector status.readyReplicas=1] logger.go:42: 01:51:20 | gr-haproxy/0-deploy-operator | ASSERT deployment percona-server-mysql-operator matching field criteria 'status.readyReplicas=1' should exist. logger.go:42: 01:51:21 | gr-haproxy/0-deploy-operator | INFO Found 1 resource(s). logger.go:42: 01:51:21 | gr-haproxy/0-deploy-operator | NAME NAMESPACE COL0 logger.go:42: 01:51:21 | gr-haproxy/0-deploy-operator | percona-server-mysql-operator ps-operator 1 logger.go:42: 01:51:21 | gr-haproxy/0-deploy-operator | ASSERT PASS logger.go:42: 01:51:21 | gr-haproxy/0-deploy-operator | test step completed 0-deploy-operator logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | starting test step 1-create-cluster logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | running command: [sh -c set -o errexit set -o xtrace source ../../functions get_cr \ | yq eval '.spec.mysql.clusterType="group-replication"' - \ | yq eval '.spec.proxy.router.enabled=false' - \ | yq eval '.spec.proxy.haproxy.enabled=true' - \ | kubectl -n "${NAMESPACE}" apply -f -] logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | + source ../../functions logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | +++ realpath ../../.. logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | ++ ROOT_REPO=/mnt/jenkins/workspace/cloud-ps-operator_PR-753 logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | ++++ pwd logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | +++ basename /mnt/jenkins/workspace/cloud-ps-operator_PR-753/e2e-tests/tests/gr-haproxy logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | ++ test_name=gr-haproxy logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | ++ source /mnt/jenkins/workspace/cloud-ps-operator_PR-753/e2e-tests/vars.sh logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | +++ export ROOT_REPO=/mnt/jenkins/workspace/cloud-ps-operator_PR-753 logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | +++ ROOT_REPO=/mnt/jenkins/workspace/cloud-ps-operator_PR-753 logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | +++ export DEPLOY_DIR=/mnt/jenkins/workspace/cloud-ps-operator_PR-753/deploy logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | +++ DEPLOY_DIR=/mnt/jenkins/workspace/cloud-ps-operator_PR-753/deploy logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | +++ export TESTS_DIR=/mnt/jenkins/workspace/cloud-ps-operator_PR-753/e2e-tests logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | +++ TESTS_DIR=/mnt/jenkins/workspace/cloud-ps-operator_PR-753/e2e-tests logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | +++ export TESTS_CONFIG_DIR=/mnt/jenkins/workspace/cloud-ps-operator_PR-753/e2e-tests/conf logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | +++ TESTS_CONFIG_DIR=/mnt/jenkins/workspace/cloud-ps-operator_PR-753/e2e-tests/conf logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | +++ export TEMP_DIR=/tmp/kuttl/ps/gr-haproxy logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | +++ TEMP_DIR=/tmp/kuttl/ps/gr-haproxy logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | ++++ git rev-parse --abbrev-ref HEAD logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | +++ export GIT_BRANCH=PR-753 logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | +++ GIT_BRANCH=PR-753 logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | +++ export VERSION=PR-753-8f2a8b69 logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | +++ VERSION=PR-753-8f2a8b69 logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | +++ export IMAGE=perconalab/percona-server-mysql-operator:PR-753-8f2a8b69 logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | +++ IMAGE=perconalab/percona-server-mysql-operator:PR-753-8f2a8b69 logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | +++ export IMAGE_MYSQL=perconalab/percona-server-mysql-operator:main-psmysql logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | +++ IMAGE_MYSQL=perconalab/percona-server-mysql-operator:main-psmysql logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | +++ export IMAGE_BACKUP=perconalab/percona-server-mysql-operator:main-backup logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | +++ IMAGE_BACKUP=perconalab/percona-server-mysql-operator:main-backup logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | +++ export IMAGE_ORCHESTRATOR=perconalab/percona-server-mysql-operator:main-orchestrator logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | +++ IMAGE_ORCHESTRATOR=perconalab/percona-server-mysql-operator:main-orchestrator logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | +++ export IMAGE_ROUTER=perconalab/percona-server-mysql-operator:main-router logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | +++ IMAGE_ROUTER=perconalab/percona-server-mysql-operator:main-router logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | +++ export IMAGE_TOOLKIT=perconalab/percona-server-mysql-operator:main-toolkit logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | +++ IMAGE_TOOLKIT=perconalab/percona-server-mysql-operator:main-toolkit logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | +++ export IMAGE_HAPROXY=perconalab/percona-server-mysql-operator:main-haproxy logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | +++ IMAGE_HAPROXY=perconalab/percona-server-mysql-operator:main-haproxy logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | +++ export PMM_SERVER_VERSION=9.9.9 logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | +++ PMM_SERVER_VERSION=9.9.9 logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | +++ export IMAGE_PMM_CLIENT=perconalab/pmm-client:dev-latest logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | +++ IMAGE_PMM_CLIENT=perconalab/pmm-client:dev-latest logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | +++ export IMAGE_PMM_SERVER=perconalab/pmm-server:dev-latest logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | +++ IMAGE_PMM_SERVER=perconalab/pmm-server:dev-latest logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | +++ export CERT_MANAGER_VER=1.15.1 logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | +++ CERT_MANAGER_VER=1.15.1 logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | ++++ which gdate logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | which: no gdate in (/mnt/jenkins/workspace/cloud-ps-operator_PR-753/bin/:/home/ec2-user/.krew/bin:/usr/local/bin:/usr/bin) logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | ++++ which date logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | +++ date=/usr/bin/date logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | +++ command -v oc logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | +++ kubectl get nodes logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | +++ grep '^minikube' logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | + get_cr logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | + local name_suffix= logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | + yq eval .spec.proxy.router.enabled=false - logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | + yq eval '.spec.mysql.clusterType="group-replication"' - logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | + yq eval .spec.proxy.haproxy.enabled=true - logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | + kubectl -n kuttl-test-artistic-swift apply -f - logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | ++ printf '.metadata.name="%s"' gr-haproxy logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | ++ printf '.spec.initImage="%s"' perconalab/percona-server-mysql-operator:PR-753-8f2a8b69 logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | + yq eval '.spec.initImage="perconalab/percona-server-mysql-operator:PR-753-8f2a8b69"' - logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | + '[' -n '' ']' logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | + yq eval '.metadata.name="gr-haproxy"' /mnt/jenkins/workspace/cloud-ps-operator_PR-753/deploy/cr.yaml logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | + yq eval - logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | ++ printf '.spec.orchestrator.image="%s"' perconalab/percona-server-mysql-operator:main-orchestrator logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | + yq eval '.spec.upgradeOptions.apply="disabled"' - logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | ++ printf '.spec.pmm.image="%s"' perconalab/pmm-client:dev-latest logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | + yq eval '.spec.pmm.image="perconalab/pmm-client:dev-latest"' - logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | + yq eval '.spec.mysql.clusterType="async"' - logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | + yq eval '.spec.orchestrator.image="perconalab/percona-server-mysql-operator:main-orchestrator"' - logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | ++ printf '.spec.proxy.router.image="%s"' perconalab/percona-server-mysql-operator:main-router logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | + yq eval '.spec.proxy.router.image="perconalab/percona-server-mysql-operator:main-router"' - logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | + yq eval '.spec.secretsName="test-secrets"' - logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | + yq eval '.spec.sslSecretName="test-ssl"' - logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | ++ printf '.spec.backup.image="%s"' perconalab/percona-server-mysql-operator:main-backup logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | + yq eval '.spec.backup.image="perconalab/percona-server-mysql-operator:main-backup"' - logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | ++ printf '.spec.mysql.image="%s"' perconalab/percona-server-mysql-operator:main-psmysql logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | + yq eval '.spec.mysql.image="perconalab/percona-server-mysql-operator:main-psmysql"' - logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | ++ printf '.spec.toolkit.image="%s"' perconalab/percona-server-mysql-operator:main-toolkit logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | + yq eval '.spec.toolkit.image="perconalab/percona-server-mysql-operator:main-toolkit"' - logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | ++ printf '.spec.proxy.haproxy.image="%s"' perconalab/percona-server-mysql-operator:main-haproxy logger.go:42: 01:51:21 | gr-haproxy/1-create-cluster | + yq eval '.spec.proxy.haproxy.image="perconalab/percona-server-mysql-operator:main-haproxy"' - logger.go:42: 01:51:22 | gr-haproxy/1-create-cluster | perconaservermysql.ps.percona.com/gr-haproxy created logger.go:42: 01:56:26 | gr-haproxy/1-create-cluster | test step completed 1-create-cluster logger.go:42: 01:56:26 | gr-haproxy/2-write-data | starting test step 2-write-data logger.go:42: 01:56:26 | gr-haproxy/2-write-data | running command: [sh -c set -o errexit set -o xtrace source ../../functions run_mysql \ "CREATE DATABASE IF NOT EXISTS myDB; CREATE TABLE IF NOT EXISTS myDB.myTable (id int PRIMARY KEY)" \ "-h $(get_haproxy_svc $(get_cluster_name)) -uroot -proot_password" run_mysql \ "INSERT myDB.myTable (id) VALUES (100500)" \ "-h $(get_haproxy_svc $(get_cluster_name)) -uroot -proot_password"] logger.go:42: 01:56:26 | gr-haproxy/2-write-data | + source ../../functions logger.go:42: 01:56:26 | gr-haproxy/2-write-data | +++ realpath ../../.. logger.go:42: 01:56:26 | gr-haproxy/2-write-data | ++ ROOT_REPO=/mnt/jenkins/workspace/cloud-ps-operator_PR-753 logger.go:42: 01:56:26 | gr-haproxy/2-write-data | ++++ pwd logger.go:42: 01:56:26 | gr-haproxy/2-write-data | +++ basename /mnt/jenkins/workspace/cloud-ps-operator_PR-753/e2e-tests/tests/gr-haproxy logger.go:42: 01:56:26 | gr-haproxy/2-write-data | ++ test_name=gr-haproxy logger.go:42: 01:56:26 | gr-haproxy/2-write-data | ++ source /mnt/jenkins/workspace/cloud-ps-operator_PR-753/e2e-tests/vars.sh logger.go:42: 01:56:26 | gr-haproxy/2-write-data | +++ export ROOT_REPO=/mnt/jenkins/workspace/cloud-ps-operator_PR-753 logger.go:42: 01:56:26 | gr-haproxy/2-write-data | +++ ROOT_REPO=/mnt/jenkins/workspace/cloud-ps-operator_PR-753 logger.go:42: 01:56:26 | gr-haproxy/2-write-data | +++ export DEPLOY_DIR=/mnt/jenkins/workspace/cloud-ps-operator_PR-753/deploy logger.go:42: 01:56:26 | gr-haproxy/2-write-data | +++ DEPLOY_DIR=/mnt/jenkins/workspace/cloud-ps-operator_PR-753/deploy logger.go:42: 01:56:26 | gr-haproxy/2-write-data | +++ export TESTS_DIR=/mnt/jenkins/workspace/cloud-ps-operator_PR-753/e2e-tests logger.go:42: 01:56:26 | gr-haproxy/2-write-data | +++ TESTS_DIR=/mnt/jenkins/workspace/cloud-ps-operator_PR-753/e2e-tests logger.go:42: 01:56:26 | gr-haproxy/2-write-data | +++ export TESTS_CONFIG_DIR=/mnt/jenkins/workspace/cloud-ps-operator_PR-753/e2e-tests/conf logger.go:42: 01:56:26 | gr-haproxy/2-write-data | +++ TESTS_CONFIG_DIR=/mnt/jenkins/workspace/cloud-ps-operator_PR-753/e2e-tests/conf logger.go:42: 01:56:26 | gr-haproxy/2-write-data | +++ export TEMP_DIR=/tmp/kuttl/ps/gr-haproxy logger.go:42: 01:56:26 | gr-haproxy/2-write-data | +++ TEMP_DIR=/tmp/kuttl/ps/gr-haproxy logger.go:42: 01:56:26 | gr-haproxy/2-write-data | ++++ git rev-parse --abbrev-ref HEAD logger.go:42: 01:56:26 | gr-haproxy/2-write-data | +++ export GIT_BRANCH=PR-753 logger.go:42: 01:56:26 | gr-haproxy/2-write-data | +++ GIT_BRANCH=PR-753 logger.go:42: 01:56:26 | gr-haproxy/2-write-data | +++ export VERSION=PR-753-8f2a8b69 logger.go:42: 01:56:26 | gr-haproxy/2-write-data | +++ VERSION=PR-753-8f2a8b69 logger.go:42: 01:56:26 | gr-haproxy/2-write-data | +++ export IMAGE=perconalab/percona-server-mysql-operator:PR-753-8f2a8b69 logger.go:42: 01:56:26 | gr-haproxy/2-write-data | +++ IMAGE=perconalab/percona-server-mysql-operator:PR-753-8f2a8b69 logger.go:42: 01:56:26 | gr-haproxy/2-write-data | +++ export IMAGE_MYSQL=perconalab/percona-server-mysql-operator:main-psmysql logger.go:42: 01:56:26 | gr-haproxy/2-write-data | +++ IMAGE_MYSQL=perconalab/percona-server-mysql-operator:main-psmysql logger.go:42: 01:56:26 | gr-haproxy/2-write-data | +++ export IMAGE_BACKUP=perconalab/percona-server-mysql-operator:main-backup logger.go:42: 01:56:26 | gr-haproxy/2-write-data | +++ IMAGE_BACKUP=perconalab/percona-server-mysql-operator:main-backup logger.go:42: 01:56:26 | gr-haproxy/2-write-data | +++ export IMAGE_ORCHESTRATOR=perconalab/percona-server-mysql-operator:main-orchestrator logger.go:42: 01:56:26 | gr-haproxy/2-write-data | +++ IMAGE_ORCHESTRATOR=perconalab/percona-server-mysql-operator:main-orchestrator logger.go:42: 01:56:26 | gr-haproxy/2-write-data | +++ export IMAGE_ROUTER=perconalab/percona-server-mysql-operator:main-router logger.go:42: 01:56:26 | gr-haproxy/2-write-data | +++ IMAGE_ROUTER=perconalab/percona-server-mysql-operator:main-router logger.go:42: 01:56:26 | gr-haproxy/2-write-data | +++ export IMAGE_TOOLKIT=perconalab/percona-server-mysql-operator:main-toolkit logger.go:42: 01:56:26 | gr-haproxy/2-write-data | +++ IMAGE_TOOLKIT=perconalab/percona-server-mysql-operator:main-toolkit logger.go:42: 01:56:26 | gr-haproxy/2-write-data | +++ export IMAGE_HAPROXY=perconalab/percona-server-mysql-operator:main-haproxy logger.go:42: 01:56:26 | gr-haproxy/2-write-data | +++ IMAGE_HAPROXY=perconalab/percona-server-mysql-operator:main-haproxy logger.go:42: 01:56:26 | gr-haproxy/2-write-data | +++ export PMM_SERVER_VERSION=9.9.9 logger.go:42: 01:56:26 | gr-haproxy/2-write-data | +++ PMM_SERVER_VERSION=9.9.9 logger.go:42: 01:56:26 | gr-haproxy/2-write-data | +++ export IMAGE_PMM_CLIENT=perconalab/pmm-client:dev-latest logger.go:42: 01:56:26 | gr-haproxy/2-write-data | +++ IMAGE_PMM_CLIENT=perconalab/pmm-client:dev-latest logger.go:42: 01:56:26 | gr-haproxy/2-write-data | +++ export IMAGE_PMM_SERVER=perconalab/pmm-server:dev-latest logger.go:42: 01:56:26 | gr-haproxy/2-write-data | +++ IMAGE_PMM_SERVER=perconalab/pmm-server:dev-latest logger.go:42: 01:56:26 | gr-haproxy/2-write-data | +++ export CERT_MANAGER_VER=1.15.1 logger.go:42: 01:56:26 | gr-haproxy/2-write-data | +++ CERT_MANAGER_VER=1.15.1 logger.go:42: 01:56:26 | gr-haproxy/2-write-data | ++++ which gdate logger.go:42: 01:56:27 | gr-haproxy/2-write-data | which: no gdate in (/mnt/jenkins/workspace/cloud-ps-operator_PR-753/bin/:/home/ec2-user/.krew/bin:/usr/local/bin:/usr/bin) logger.go:42: 01:56:27 | gr-haproxy/2-write-data | ++++ which date logger.go:42: 01:56:27 | gr-haproxy/2-write-data | +++ date=/usr/bin/date logger.go:42: 01:56:27 | gr-haproxy/2-write-data | +++ command -v oc logger.go:42: 01:56:27 | gr-haproxy/2-write-data | +++ grep '^minikube' logger.go:42: 01:56:27 | gr-haproxy/2-write-data | +++ kubectl get nodes logger.go:42: 01:56:27 | gr-haproxy/2-write-data | +++ get_cluster_name logger.go:42: 01:56:27 | gr-haproxy/2-write-data | +++ kubectl -n kuttl-test-artistic-swift get ps -o 'jsonpath={.items[0].metadata.name}' logger.go:42: 01:56:27 | gr-haproxy/2-write-data | ++ get_haproxy_svc gr-haproxy logger.go:42: 01:56:27 | gr-haproxy/2-write-data | ++ local cluster=gr-haproxy logger.go:42: 01:56:27 | gr-haproxy/2-write-data | ++ echo gr-haproxy-haproxy logger.go:42: 01:56:27 | gr-haproxy/2-write-data | + run_mysql 'CREATE DATABASE IF NOT EXISTS myDB; CREATE TABLE IF NOT EXISTS myDB.myTable (id int PRIMARY KEY)' '-h gr-haproxy-haproxy -uroot -proot_password' logger.go:42: 01:56:27 | gr-haproxy/2-write-data | + local 'command=CREATE DATABASE IF NOT EXISTS myDB; CREATE TABLE IF NOT EXISTS myDB.myTable (id int PRIMARY KEY)' logger.go:42: 01:56:27 | gr-haproxy/2-write-data | + local 'uri=-h gr-haproxy-haproxy -uroot -proot_password' logger.go:42: 01:56:27 | gr-haproxy/2-write-data | + local pod= logger.go:42: 01:56:27 | gr-haproxy/2-write-data | ++ get_client_pod logger.go:42: 01:56:27 | gr-haproxy/2-write-data | ++ kubectl -n kuttl-test-artistic-swift get pods --selector=name=mysql-client -o 'jsonpath={.items[].metadata.name}' logger.go:42: 01:56:28 | gr-haproxy/2-write-data | + client_pod=mysql-client logger.go:42: 01:56:28 | gr-haproxy/2-write-data | + wait_pod mysql-client logger.go:42: 01:56:28 | gr-haproxy/2-write-data | + local pod=mysql-client logger.go:42: 01:56:28 | gr-haproxy/2-write-data | + set +o xtrace logger.go:42: 01:56:28 | gr-haproxy/2-write-data | mysql-clienttrue logger.go:42: 01:56:28 | gr-haproxy/2-write-data | + kubectl -n kuttl-test-artistic-swift exec mysql-client -- bash -c 'printf '\''%s\n'\'' "CREATE DATABASE IF NOT EXISTS myDB; CREATE TABLE IF NOT EXISTS myDB.myTable (id int PRIMARY KEY)" | mysql -sN -h gr-haproxy-haproxy -uroot -proot_password' logger.go:42: 01:56:28 | gr-haproxy/2-write-data | + sed -e 's/mysql: //' logger.go:42: 01:56:28 | gr-haproxy/2-write-data | + grep -v 'Using a password on the command line interface can be insecure.' logger.go:42: 01:56:30 | gr-haproxy/2-write-data | + : logger.go:42: 01:56:30 | gr-haproxy/2-write-data | +++ get_cluster_name logger.go:42: 01:56:30 | gr-haproxy/2-write-data | +++ kubectl -n kuttl-test-artistic-swift get ps -o 'jsonpath={.items[0].metadata.name}' logger.go:42: 01:56:30 | gr-haproxy/2-write-data | ++ get_haproxy_svc gr-haproxy logger.go:42: 01:56:30 | gr-haproxy/2-write-data | ++ local cluster=gr-haproxy logger.go:42: 01:56:30 | gr-haproxy/2-write-data | ++ echo gr-haproxy-haproxy logger.go:42: 01:56:30 | gr-haproxy/2-write-data | + run_mysql 'INSERT myDB.myTable (id) VALUES (100500)' '-h gr-haproxy-haproxy -uroot -proot_password' logger.go:42: 01:56:30 | gr-haproxy/2-write-data | + local 'command=INSERT myDB.myTable (id) VALUES (100500)' logger.go:42: 01:56:30 | gr-haproxy/2-write-data | + local 'uri=-h gr-haproxy-haproxy -uroot -proot_password' logger.go:42: 01:56:30 | gr-haproxy/2-write-data | + local pod= logger.go:42: 01:56:30 | gr-haproxy/2-write-data | ++ get_client_pod logger.go:42: 01:56:30 | gr-haproxy/2-write-data | ++ kubectl -n kuttl-test-artistic-swift get pods --selector=name=mysql-client -o 'jsonpath={.items[].metadata.name}' logger.go:42: 01:56:30 | gr-haproxy/2-write-data | + client_pod=mysql-client logger.go:42: 01:56:30 | gr-haproxy/2-write-data | + wait_pod mysql-client logger.go:42: 01:56:30 | gr-haproxy/2-write-data | + local pod=mysql-client logger.go:42: 01:56:30 | gr-haproxy/2-write-data | + set +o xtrace logger.go:42: 01:56:31 | gr-haproxy/2-write-data | mysql-clienttrue logger.go:42: 01:56:31 | gr-haproxy/2-write-data | + kubectl -n kuttl-test-artistic-swift exec mysql-client -- bash -c 'printf '\''%s\n'\'' "INSERT myDB.myTable (id) VALUES (100500)" | mysql -sN -h gr-haproxy-haproxy -uroot -proot_password' logger.go:42: 01:56:31 | gr-haproxy/2-write-data | + sed -e 's/mysql: //' logger.go:42: 01:56:31 | gr-haproxy/2-write-data | + grep -v 'Using a password on the command line interface can be insecure.' logger.go:42: 01:56:32 | gr-haproxy/2-write-data | + : [controller-runtime] log.SetLogger(...) was never called; logs will not be displayed. Detected at: > goroutine 13 [running]: > runtime/debug.Stack() > /nix/store/wkbckbd30nlhq4dxzg64q6y4vm1xx4fk-go-1.22.1/share/go/src/runtime/debug/stack.go:24 +0x5e > sigs.k8s.io/controller-runtime/pkg/log.eventuallyFulfillRoot() > /home/mowsiany/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.16.3/pkg/log/log.go:60 +0xcd > sigs.k8s.io/controller-runtime/pkg/log.(*delegatingLogSink).WithName(0xc0002ebc00, {0x184a055, 0x14}) > /home/mowsiany/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.16.3/pkg/log/deleg.go:147 +0x3e > github.com/go-logr/logr.Logger.WithName({{0x1acb7d8, 0xc0002ebc00}, 0x0}, {0x184a055?, 0xc000671f80?}) > /home/mowsiany/go/pkg/mod/github.com/go-logr/logr@v1.2.4/logr.go:336 +0x36 > sigs.k8s.io/controller-runtime/pkg/client.newClient(0x131ead3?, {0x0, 0xc00045a9a0, {0x1accd90, 0xc0003a0040}, 0x0, {0x0, 0x0}, 0x0}) > /home/mowsiany/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.16.3/pkg/client/client.go:122 +0xf1 > sigs.k8s.io/controller-runtime/pkg/client.New(0xc0004b9d48?, {0x0, 0xc00045a9a0, {0x1accd90, 0xc0003a0040}, 0x0, {0x0, 0x0}, 0x0}) > /home/mowsiany/go/pkg/mod/sigs.k8s.io/controller-runtime@v0.16.3/pkg/client/client.go:103 +0x7d > github.com/kudobuilder/kuttl/pkg/test/utils.NewRetryClient(0xc0004b9d48, {0x0, 0xc00045a9a0, {0x1accd90, 0xc0003a0040}, 0x0, {0x0, 0x0}, 0x0}) > /home/mowsiany/go/src/github.com/kudobuilder/kuttl/pkg/test/utils/kubernetes.go:177 +0x127 > github.com/kudobuilder/kuttl/pkg/test.(*Harness).Client(0xc000359208, 0x6a?) > /home/mowsiany/go/src/github.com/kudobuilder/kuttl/pkg/test/harness.go:323 +0x18e > github.com/kudobuilder/kuttl/pkg/test.(*Step).Create(0xc000126a90, 0xc00037e4e0, {0xc000166360, 0x19}) > /home/mowsiany/go/src/github.com/kudobuilder/kuttl/pkg/test/step.go:177 +0x63 > github.com/kudobuilder/kuttl/pkg/test.(*Step).Run(0xc000126a90, 0xc00037e4e0, {0xc000166360, 0x19}) > /home/mowsiany/go/src/github.com/kudobuilder/kuttl/pkg/test/step.go:457 +0x24a > github.com/kudobuilder/kuttl/pkg/test.(*Case).Run(0xc0003aa960, 0xc00037e4e0, 0xc0003d9b90) > /home/mowsiany/go/src/github.com/kudobuilder/kuttl/pkg/test/case.go:373 +0xaeb > github.com/kudobuilder/kuttl/pkg/test.(*Harness).RunTests.func1.1(0xc00037e4e0) > /home/mowsiany/go/src/github.com/kudobuilder/kuttl/pkg/test/harness.go:401 +0x12e > testing.tRunner(0xc00037e4e0, 0xc000122888) > /nix/store/wkbckbd30nlhq4dxzg64q6y4vm1xx4fk-go-1.22.1/share/go/src/testing/testing.go:1689 +0xfb > created by testing.(*T).Run in goroutine 12 > /nix/store/wkbckbd30nlhq4dxzg64q6y4vm1xx4fk-go-1.22.1/share/go/src/testing/testing.go:1742 +0x390 logger.go:42: 01:56:32 | gr-haproxy/2-write-data | test step completed 2-write-data logger.go:42: 01:56:32 | gr-haproxy/3-check-connections | starting test step 3-check-connections logger.go:42: 01:56:32 | gr-haproxy/3-check-connections | running command: [sh -c set -o errexit set -o xtrace source ../../functions args="" primary=$(run_mysql "SELECT count(*) FROM myDB.myTable" "-h $(get_haproxy_svc $(get_cluster_name)) -uroot -proot_password") args="${args} --from-literal=primary=${primary}" replica=$(run_mysql "SELECT count(*) FROM myDB.myTable" "-h $(get_haproxy_svc $(get_cluster_name)) -P 3307 -uroot -proot_password") args="${args} --from-literal=replica=${replica}" # uncomment after https://jira.percona.com/browse/K8SPS-284 # proxy_protocol=$(run_mysql "SELECT count(*) FROM myDB.myTable" "-h $(get_haproxy_svc $(get_cluster_name)) -P 3309 -uroot -proot_password") # args="${args} --from-literal=proxy_protocol=${proxy_protocol}" mysqlx=$(run_mysqlsh "SELECT count(*) FROM myDB.myTable" "-h $(get_haproxy_svc $(get_cluster_name)) -P 33060 -uroot -proot_password") args="${args} --from-literal=mysqlx=${mysqlx}" mysql_admin=$(run_mysql "SELECT count(*) FROM myDB.myTable" "-h $(get_haproxy_svc $(get_cluster_name)) -P 33062 -uroot -proot_password") args="${args} --from-literal=mysql_admin=${mysql_admin}" kubectl create configmap -n "${NAMESPACE}" 03-check-connections $args] logger.go:42: 01:56:32 | gr-haproxy/3-check-connections | + source ../../functions logger.go:42: 01:56:32 | gr-haproxy/3-check-connections | +++ realpath ../../.. logger.go:42: 01:56:32 | gr-haproxy/3-check-connections | ++ ROOT_REPO=/mnt/jenkins/workspace/cloud-ps-operator_PR-753 logger.go:42: 01:56:32 | gr-haproxy/3-check-connections | ++++ pwd logger.go:42: 01:56:32 | gr-haproxy/3-check-connections | +++ basename /mnt/jenkins/workspace/cloud-ps-operator_PR-753/e2e-tests/tests/gr-haproxy logger.go:42: 01:56:32 | gr-haproxy/3-check-connections | ++ test_name=gr-haproxy logger.go:42: 01:56:32 | gr-haproxy/3-check-connections | ++ source /mnt/jenkins/workspace/cloud-ps-operator_PR-753/e2e-tests/vars.sh logger.go:42: 01:56:32 | gr-haproxy/3-check-connections | +++ export ROOT_REPO=/mnt/jenkins/workspace/cloud-ps-operator_PR-753 logger.go:42: 01:56:32 | gr-haproxy/3-check-connections | +++ ROOT_REPO=/mnt/jenkins/workspace/cloud-ps-operator_PR-753 logger.go:42: 01:56:32 | gr-haproxy/3-check-connections | +++ export DEPLOY_DIR=/mnt/jenkins/workspace/cloud-ps-operator_PR-753/deploy logger.go:42: 01:56:32 | gr-haproxy/3-check-connections | +++ DEPLOY_DIR=/mnt/jenkins/workspace/cloud-ps-operator_PR-753/deploy logger.go:42: 01:56:32 | gr-haproxy/3-check-connections | +++ export TESTS_DIR=/mnt/jenkins/workspace/cloud-ps-operator_PR-753/e2e-tests logger.go:42: 01:56:32 | gr-haproxy/3-check-connections | +++ TESTS_DIR=/mnt/jenkins/workspace/cloud-ps-operator_PR-753/e2e-tests logger.go:42: 01:56:32 | gr-haproxy/3-check-connections | +++ export TESTS_CONFIG_DIR=/mnt/jenkins/workspace/cloud-ps-operator_PR-753/e2e-tests/conf logger.go:42: 01:56:32 | gr-haproxy/3-check-connections | +++ TESTS_CONFIG_DIR=/mnt/jenkins/workspace/cloud-ps-operator_PR-753/e2e-tests/conf logger.go:42: 01:56:32 | gr-haproxy/3-check-connections | +++ export TEMP_DIR=/tmp/kuttl/ps/gr-haproxy logger.go:42: 01:56:32 | gr-haproxy/3-check-connections | +++ TEMP_DIR=/tmp/kuttl/ps/gr-haproxy logger.go:42: 01:56:32 | gr-haproxy/3-check-connections | ++++ git rev-parse --abbrev-ref HEAD logger.go:42: 01:56:32 | gr-haproxy/3-check-connections | +++ export GIT_BRANCH=PR-753 logger.go:42: 01:56:32 | gr-haproxy/3-check-connections | +++ GIT_BRANCH=PR-753 logger.go:42: 01:56:32 | gr-haproxy/3-check-connections | +++ export VERSION=PR-753-8f2a8b69 logger.go:42: 01:56:32 | gr-haproxy/3-check-connections | +++ VERSION=PR-753-8f2a8b69 logger.go:42: 01:56:32 | gr-haproxy/3-check-connections | +++ export IMAGE=perconalab/percona-server-mysql-operator:PR-753-8f2a8b69 logger.go:42: 01:56:32 | gr-haproxy/3-check-connections | +++ IMAGE=perconalab/percona-server-mysql-operator:PR-753-8f2a8b69 logger.go:42: 01:56:32 | gr-haproxy/3-check-connections | +++ export IMAGE_MYSQL=perconalab/percona-server-mysql-operator:main-psmysql logger.go:42: 01:56:32 | gr-haproxy/3-check-connections | +++ IMAGE_MYSQL=perconalab/percona-server-mysql-operator:main-psmysql logger.go:42: 01:56:32 | gr-haproxy/3-check-connections | +++ export IMAGE_BACKUP=perconalab/percona-server-mysql-operator:main-backup logger.go:42: 01:56:32 | gr-haproxy/3-check-connections | +++ IMAGE_BACKUP=perconalab/percona-server-mysql-operator:main-backup logger.go:42: 01:56:32 | gr-haproxy/3-check-connections | +++ export IMAGE_ORCHESTRATOR=perconalab/percona-server-mysql-operator:main-orchestrator logger.go:42: 01:56:32 | gr-haproxy/3-check-connections | +++ IMAGE_ORCHESTRATOR=perconalab/percona-server-mysql-operator:main-orchestrator logger.go:42: 01:56:32 | gr-haproxy/3-check-connections | +++ export IMAGE_ROUTER=perconalab/percona-server-mysql-operator:main-router logger.go:42: 01:56:32 | gr-haproxy/3-check-connections | +++ IMAGE_ROUTER=perconalab/percona-server-mysql-operator:main-router logger.go:42: 01:56:32 | gr-haproxy/3-check-connections | +++ export IMAGE_TOOLKIT=perconalab/percona-server-mysql-operator:main-toolkit logger.go:42: 01:56:32 | gr-haproxy/3-check-connections | +++ IMAGE_TOOLKIT=perconalab/percona-server-mysql-operator:main-toolkit logger.go:42: 01:56:32 | gr-haproxy/3-check-connections | +++ export IMAGE_HAPROXY=perconalab/percona-server-mysql-operator:main-haproxy logger.go:42: 01:56:32 | gr-haproxy/3-check-connections | +++ IMAGE_HAPROXY=perconalab/percona-server-mysql-operator:main-haproxy logger.go:42: 01:56:32 | gr-haproxy/3-check-connections | +++ export PMM_SERVER_VERSION=9.9.9 logger.go:42: 01:56:32 | gr-haproxy/3-check-connections | +++ PMM_SERVER_VERSION=9.9.9 logger.go:42: 01:56:32 | gr-haproxy/3-check-connections | +++ export IMAGE_PMM_CLIENT=perconalab/pmm-client:dev-latest logger.go:42: 01:56:32 | gr-haproxy/3-check-connections | +++ IMAGE_PMM_CLIENT=perconalab/pmm-client:dev-latest logger.go:42: 01:56:32 | gr-haproxy/3-check-connections | +++ export IMAGE_PMM_SERVER=perconalab/pmm-server:dev-latest logger.go:42: 01:56:32 | gr-haproxy/3-check-connections | +++ IMAGE_PMM_SERVER=perconalab/pmm-server:dev-latest logger.go:42: 01:56:32 | gr-haproxy/3-check-connections | +++ export CERT_MANAGER_VER=1.15.1 logger.go:42: 01:56:32 | gr-haproxy/3-check-connections | +++ CERT_MANAGER_VER=1.15.1 logger.go:42: 01:56:32 | gr-haproxy/3-check-connections | ++++ which gdate logger.go:42: 01:56:32 | gr-haproxy/3-check-connections | which: no gdate in (/mnt/jenkins/workspace/cloud-ps-operator_PR-753/bin/:/home/ec2-user/.krew/bin:/usr/local/bin:/usr/bin) logger.go:42: 01:56:32 | gr-haproxy/3-check-connections | ++++ which date logger.go:42: 01:56:32 | gr-haproxy/3-check-connections | +++ date=/usr/bin/date logger.go:42: 01:56:32 | gr-haproxy/3-check-connections | +++ command -v oc logger.go:42: 01:56:32 | gr-haproxy/3-check-connections | +++ kubectl get nodes logger.go:42: 01:56:32 | gr-haproxy/3-check-connections | +++ grep '^minikube' logger.go:42: 01:56:33 | gr-haproxy/3-check-connections | + args= logger.go:42: 01:56:33 | gr-haproxy/3-check-connections | ++++ get_cluster_name logger.go:42: 01:56:33 | gr-haproxy/3-check-connections | ++++ kubectl -n kuttl-test-artistic-swift get ps -o 'jsonpath={.items[0].metadata.name}' logger.go:42: 01:56:33 | gr-haproxy/3-check-connections | +++ get_haproxy_svc gr-haproxy logger.go:42: 01:56:33 | gr-haproxy/3-check-connections | +++ local cluster=gr-haproxy logger.go:42: 01:56:33 | gr-haproxy/3-check-connections | +++ echo gr-haproxy-haproxy logger.go:42: 01:56:33 | gr-haproxy/3-check-connections | ++ run_mysql 'SELECT count(*) FROM myDB.myTable' '-h gr-haproxy-haproxy -uroot -proot_password' logger.go:42: 01:56:33 | gr-haproxy/3-check-connections | ++ local 'command=SELECT count(*) FROM myDB.myTable' logger.go:42: 01:56:33 | gr-haproxy/3-check-connections | ++ local 'uri=-h gr-haproxy-haproxy -uroot -proot_password' logger.go:42: 01:56:33 | gr-haproxy/3-check-connections | ++ local pod= logger.go:42: 01:56:33 | gr-haproxy/3-check-connections | +++ get_client_pod logger.go:42: 01:56:33 | gr-haproxy/3-check-connections | +++ kubectl -n kuttl-test-artistic-swift get pods --selector=name=mysql-client -o 'jsonpath={.items[].metadata.name}' logger.go:42: 01:56:34 | gr-haproxy/3-check-connections | ++ client_pod=mysql-client logger.go:42: 01:56:34 | gr-haproxy/3-check-connections | ++ wait_pod mysql-client logger.go:42: 01:56:34 | gr-haproxy/3-check-connections | ++ local pod=mysql-client logger.go:42: 01:56:34 | gr-haproxy/3-check-connections | ++ set +o xtrace logger.go:42: 01:56:34 | gr-haproxy/3-check-connections | mysql-clienttrue logger.go:42: 01:56:34 | gr-haproxy/3-check-connections | ++ kubectl -n kuttl-test-artistic-swift exec mysql-client -- bash -c 'printf '\''%s\n'\'' "SELECT count(*) FROM myDB.myTable" | mysql -sN -h gr-haproxy-haproxy -uroot -proot_password' logger.go:42: 01:56:34 | gr-haproxy/3-check-connections | ++ sed -e 's/mysql: //' logger.go:42: 01:56:34 | gr-haproxy/3-check-connections | ++ grep -v 'Using a password on the command line interface can be insecure.' logger.go:42: 01:56:36 | gr-haproxy/3-check-connections | + primary=1 logger.go:42: 01:56:36 | gr-haproxy/3-check-connections | + args=' --from-literal=primary=1' logger.go:42: 01:56:36 | gr-haproxy/3-check-connections | ++++ get_cluster_name logger.go:42: 01:56:36 | gr-haproxy/3-check-connections | ++++ kubectl -n kuttl-test-artistic-swift get ps -o 'jsonpath={.items[0].metadata.name}' logger.go:42: 01:56:36 | gr-haproxy/3-check-connections | +++ get_haproxy_svc gr-haproxy logger.go:42: 01:56:36 | gr-haproxy/3-check-connections | +++ local cluster=gr-haproxy logger.go:42: 01:56:36 | gr-haproxy/3-check-connections | +++ echo gr-haproxy-haproxy logger.go:42: 01:56:36 | gr-haproxy/3-check-connections | ++ run_mysql 'SELECT count(*) FROM myDB.myTable' '-h gr-haproxy-haproxy -P 3307 -uroot -proot_password' logger.go:42: 01:56:36 | gr-haproxy/3-check-connections | ++ local 'command=SELECT count(*) FROM myDB.myTable' logger.go:42: 01:56:36 | gr-haproxy/3-check-connections | ++ local 'uri=-h gr-haproxy-haproxy -P 3307 -uroot -proot_password' logger.go:42: 01:56:36 | gr-haproxy/3-check-connections | ++ local pod= logger.go:42: 01:56:36 | gr-haproxy/3-check-connections | +++ get_client_pod logger.go:42: 01:56:36 | gr-haproxy/3-check-connections | +++ kubectl -n kuttl-test-artistic-swift get pods --selector=name=mysql-client -o 'jsonpath={.items[].metadata.name}' logger.go:42: 01:56:36 | gr-haproxy/3-check-connections | ++ client_pod=mysql-client logger.go:42: 01:56:36 | gr-haproxy/3-check-connections | ++ wait_pod mysql-client logger.go:42: 01:56:36 | gr-haproxy/3-check-connections | ++ local pod=mysql-client logger.go:42: 01:56:36 | gr-haproxy/3-check-connections | ++ set +o xtrace logger.go:42: 01:56:37 | gr-haproxy/3-check-connections | mysql-clienttrue logger.go:42: 01:56:37 | gr-haproxy/3-check-connections | ++ sed -e 's/mysql: //' logger.go:42: 01:56:37 | gr-haproxy/3-check-connections | ++ grep -v 'Using a password on the command line interface can be insecure.' logger.go:42: 01:56:37 | gr-haproxy/3-check-connections | ++ kubectl -n kuttl-test-artistic-swift exec mysql-client -- bash -c 'printf '\''%s\n'\'' "SELECT count(*) FROM myDB.myTable" | mysql -sN -h gr-haproxy-haproxy -P 3307 -uroot -proot_password' logger.go:42: 01:56:38 | gr-haproxy/3-check-connections | + replica=1 logger.go:42: 01:56:38 | gr-haproxy/3-check-connections | + args=' --from-literal=primary=1 --from-literal=replica=1' logger.go:42: 01:56:38 | gr-haproxy/3-check-connections | ++++ get_cluster_name logger.go:42: 01:56:38 | gr-haproxy/3-check-connections | ++++ kubectl -n kuttl-test-artistic-swift get ps -o 'jsonpath={.items[0].metadata.name}' logger.go:42: 01:56:39 | gr-haproxy/3-check-connections | +++ get_haproxy_svc gr-haproxy logger.go:42: 01:56:39 | gr-haproxy/3-check-connections | +++ local cluster=gr-haproxy logger.go:42: 01:56:39 | gr-haproxy/3-check-connections | +++ echo gr-haproxy-haproxy logger.go:42: 01:56:39 | gr-haproxy/3-check-connections | ++ run_mysqlsh 'SELECT count(*) FROM myDB.myTable' '-h gr-haproxy-haproxy -P 33060 -uroot -proot_password' logger.go:42: 01:56:39 | gr-haproxy/3-check-connections | ++ local 'command=SELECT count(*) FROM myDB.myTable' logger.go:42: 01:56:39 | gr-haproxy/3-check-connections | ++ local 'uri=-h gr-haproxy-haproxy -P 33060 -uroot -proot_password' logger.go:42: 01:56:39 | gr-haproxy/3-check-connections | ++ local pod= logger.go:42: 01:56:39 | gr-haproxy/3-check-connections | +++ get_client_pod logger.go:42: 01:56:39 | gr-haproxy/3-check-connections | +++ kubectl -n kuttl-test-artistic-swift get pods --selector=name=mysql-client -o 'jsonpath={.items[].metadata.name}' logger.go:42: 01:56:39 | gr-haproxy/3-check-connections | ++ client_pod=mysql-client logger.go:42: 01:56:39 | gr-haproxy/3-check-connections | ++ wait_pod mysql-client logger.go:42: 01:56:39 | gr-haproxy/3-check-connections | ++ local pod=mysql-client logger.go:42: 01:56:39 | gr-haproxy/3-check-connections | ++ set +o xtrace logger.go:42: 01:56:40 | gr-haproxy/3-check-connections | mysql-clienttrue logger.go:42: 01:56:40 | gr-haproxy/3-check-connections | ++ kubectl -n kuttl-test-artistic-swift exec mysql-client -- bash -c 'printf '\''%s\n'\'' "SELECT count(*) FROM myDB.myTable" | mysqlsh --sql --quiet-start=2 -h gr-haproxy-haproxy -P 33060 -uroot -proot_password' logger.go:42: 01:56:40 | gr-haproxy/3-check-connections | ++ tail -n +2 logger.go:42: 01:56:41 | gr-haproxy/3-check-connections | + mysqlx=1 logger.go:42: 01:56:41 | gr-haproxy/3-check-connections | + args=' --from-literal=primary=1 --from-literal=replica=1 --from-literal=mysqlx=1' logger.go:42: 01:56:41 | gr-haproxy/3-check-connections | ++++ get_cluster_name logger.go:42: 01:56:41 | gr-haproxy/3-check-connections | ++++ kubectl -n kuttl-test-artistic-swift get ps -o 'jsonpath={.items[0].metadata.name}' logger.go:42: 01:56:42 | gr-haproxy/3-check-connections | +++ get_haproxy_svc gr-haproxy logger.go:42: 01:56:42 | gr-haproxy/3-check-connections | +++ local cluster=gr-haproxy logger.go:42: 01:56:42 | gr-haproxy/3-check-connections | +++ echo gr-haproxy-haproxy logger.go:42: 01:56:42 | gr-haproxy/3-check-connections | ++ run_mysql 'SELECT count(*) FROM myDB.myTable' '-h gr-haproxy-haproxy -P 33062 -uroot -proot_password' logger.go:42: 01:56:42 | gr-haproxy/3-check-connections | ++ local 'command=SELECT count(*) FROM myDB.myTable' logger.go:42: 01:56:42 | gr-haproxy/3-check-connections | ++ local 'uri=-h gr-haproxy-haproxy -P 33062 -uroot -proot_password' logger.go:42: 01:56:42 | gr-haproxy/3-check-connections | ++ local pod= logger.go:42: 01:56:42 | gr-haproxy/3-check-connections | +++ get_client_pod logger.go:42: 01:56:42 | gr-haproxy/3-check-connections | +++ kubectl -n kuttl-test-artistic-swift get pods --selector=name=mysql-client -o 'jsonpath={.items[].metadata.name}' logger.go:42: 01:56:42 | gr-haproxy/3-check-connections | ++ client_pod=mysql-client logger.go:42: 01:56:42 | gr-haproxy/3-check-connections | ++ wait_pod mysql-client logger.go:42: 01:56:42 | gr-haproxy/3-check-connections | ++ local pod=mysql-client logger.go:42: 01:56:42 | gr-haproxy/3-check-connections | ++ set +o xtrace logger.go:42: 01:56:42 | gr-haproxy/3-check-connections | mysql-clienttrue logger.go:42: 01:56:42 | gr-haproxy/3-check-connections | ++ kubectl -n kuttl-test-artistic-swift exec mysql-client -- bash -c 'printf '\''%s\n'\'' "SELECT count(*) FROM myDB.myTable" | mysql -sN -h gr-haproxy-haproxy -P 33062 -uroot -proot_password' logger.go:42: 01:56:42 | gr-haproxy/3-check-connections | ++ sed -e 's/mysql: //' logger.go:42: 01:56:42 | gr-haproxy/3-check-connections | ++ grep -v 'Using a password on the command line interface can be insecure.' logger.go:42: 01:56:44 | gr-haproxy/3-check-connections | + mysql_admin=1 logger.go:42: 01:56:44 | gr-haproxy/3-check-connections | + args=' --from-literal=primary=1 --from-literal=replica=1 --from-literal=mysqlx=1 --from-literal=mysql_admin=1' logger.go:42: 01:56:44 | gr-haproxy/3-check-connections | + kubectl create configmap -n kuttl-test-artistic-swift 03-check-connections --from-literal=primary=1 --from-literal=replica=1 --from-literal=mysqlx=1 --from-literal=mysql_admin=1 logger.go:42: 01:56:44 | gr-haproxy/3-check-connections | configmap/03-check-connections created logger.go:42: 01:56:45 | gr-haproxy/3-check-connections | test step completed 3-check-connections logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | starting test step 4-check-password-leak logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | running command: [sh -c set -o errexit set -o xtrace source ../../functions check_passwords_leak] logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | + source ../../functions logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | +++ realpath ../../.. logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | ++ ROOT_REPO=/mnt/jenkins/workspace/cloud-ps-operator_PR-753 logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | ++++ pwd logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | +++ basename /mnt/jenkins/workspace/cloud-ps-operator_PR-753/e2e-tests/tests/gr-haproxy logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | ++ test_name=gr-haproxy logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | ++ source /mnt/jenkins/workspace/cloud-ps-operator_PR-753/e2e-tests/vars.sh logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | +++ export ROOT_REPO=/mnt/jenkins/workspace/cloud-ps-operator_PR-753 logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | +++ ROOT_REPO=/mnt/jenkins/workspace/cloud-ps-operator_PR-753 logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | +++ export DEPLOY_DIR=/mnt/jenkins/workspace/cloud-ps-operator_PR-753/deploy logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | +++ DEPLOY_DIR=/mnt/jenkins/workspace/cloud-ps-operator_PR-753/deploy logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | +++ export TESTS_DIR=/mnt/jenkins/workspace/cloud-ps-operator_PR-753/e2e-tests logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | +++ TESTS_DIR=/mnt/jenkins/workspace/cloud-ps-operator_PR-753/e2e-tests logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | +++ export TESTS_CONFIG_DIR=/mnt/jenkins/workspace/cloud-ps-operator_PR-753/e2e-tests/conf logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | +++ TESTS_CONFIG_DIR=/mnt/jenkins/workspace/cloud-ps-operator_PR-753/e2e-tests/conf logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | +++ export TEMP_DIR=/tmp/kuttl/ps/gr-haproxy logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | +++ TEMP_DIR=/tmp/kuttl/ps/gr-haproxy logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | ++++ git rev-parse --abbrev-ref HEAD logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | +++ export GIT_BRANCH=PR-753 logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | +++ GIT_BRANCH=PR-753 logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | +++ export VERSION=PR-753-8f2a8b69 logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | +++ VERSION=PR-753-8f2a8b69 logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | +++ export IMAGE=perconalab/percona-server-mysql-operator:PR-753-8f2a8b69 logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | +++ IMAGE=perconalab/percona-server-mysql-operator:PR-753-8f2a8b69 logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | +++ export IMAGE_MYSQL=perconalab/percona-server-mysql-operator:main-psmysql logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | +++ IMAGE_MYSQL=perconalab/percona-server-mysql-operator:main-psmysql logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | +++ export IMAGE_BACKUP=perconalab/percona-server-mysql-operator:main-backup logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | +++ IMAGE_BACKUP=perconalab/percona-server-mysql-operator:main-backup logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | +++ export IMAGE_ORCHESTRATOR=perconalab/percona-server-mysql-operator:main-orchestrator logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | +++ IMAGE_ORCHESTRATOR=perconalab/percona-server-mysql-operator:main-orchestrator logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | +++ export IMAGE_ROUTER=perconalab/percona-server-mysql-operator:main-router logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | +++ IMAGE_ROUTER=perconalab/percona-server-mysql-operator:main-router logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | +++ export IMAGE_TOOLKIT=perconalab/percona-server-mysql-operator:main-toolkit logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | +++ IMAGE_TOOLKIT=perconalab/percona-server-mysql-operator:main-toolkit logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | +++ export IMAGE_HAPROXY=perconalab/percona-server-mysql-operator:main-haproxy logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | +++ IMAGE_HAPROXY=perconalab/percona-server-mysql-operator:main-haproxy logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | +++ export PMM_SERVER_VERSION=9.9.9 logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | +++ PMM_SERVER_VERSION=9.9.9 logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | +++ export IMAGE_PMM_CLIENT=perconalab/pmm-client:dev-latest logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | +++ IMAGE_PMM_CLIENT=perconalab/pmm-client:dev-latest logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | +++ export IMAGE_PMM_SERVER=perconalab/pmm-server:dev-latest logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | +++ IMAGE_PMM_SERVER=perconalab/pmm-server:dev-latest logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | +++ export CERT_MANAGER_VER=1.15.1 logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | +++ CERT_MANAGER_VER=1.15.1 logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | ++++ which gdate logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | which: no gdate in (/mnt/jenkins/workspace/cloud-ps-operator_PR-753/bin/:/home/ec2-user/.krew/bin:/usr/local/bin:/usr/bin) logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | ++++ which date logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | +++ date=/usr/bin/date logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | +++ command -v oc logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | +++ kubectl get nodes logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | +++ grep '^minikube' logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | + check_passwords_leak logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | + local secrets logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | + local passwords logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | + local pods logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | ++ kubectl get secrets -o json logger.go:42: 01:56:45 | gr-haproxy/4-check-password-leak | ++ jq -r '.items[].data | to_entries | .[] | select(.key | (endswith(".crt") or endswith(".key") or endswith(".pub") or endswith(".pem") or endswith(".p12") or test("namespace")) | not) | .value' logger.go:42: 01:56:46 | gr-haproxy/4-check-password-leak | + secrets= logger.go:42: 01:56:46 | gr-haproxy/4-check-password-leak | + passwords=' ' logger.go:42: 01:56:46 | gr-haproxy/4-check-password-leak | ++ kubectl -n kuttl-test-artistic-swift get pods -o name logger.go:42: 01:56:46 | gr-haproxy/4-check-password-leak | ++ awk -F / '{print $2}' logger.go:42: 01:56:46 | gr-haproxy/4-check-password-leak | + pods='gr-haproxy-haproxy-0 logger.go:42: 01:56:46 | gr-haproxy/4-check-password-leak | gr-haproxy-haproxy-1 logger.go:42: 01:56:46 | gr-haproxy/4-check-password-leak | gr-haproxy-haproxy-2 logger.go:42: 01:56:46 | gr-haproxy/4-check-password-leak | gr-haproxy-mysql-0 logger.go:42: 01:56:46 | gr-haproxy/4-check-password-leak | gr-haproxy-mysql-1 logger.go:42: 01:56:46 | gr-haproxy/4-check-password-leak | gr-haproxy-mysql-2 logger.go:42: 01:56:46 | gr-haproxy/4-check-password-leak | mysql-client' logger.go:42: 01:56:46 | gr-haproxy/4-check-password-leak | + collect_logs kuttl-test-artistic-swift logger.go:42: 01:56:46 | gr-haproxy/4-check-password-leak | + local containers logger.go:42: 01:56:46 | gr-haproxy/4-check-password-leak | + local count logger.go:42: 01:56:46 | gr-haproxy/4-check-password-leak | + NS=kuttl-test-artistic-swift logger.go:42: 01:56:46 | gr-haproxy/4-check-password-leak | + for p in '$pods' logger.go:42: 01:56:46 | gr-haproxy/4-check-password-leak | ++ kubectl -n kuttl-test-artistic-swift get pod gr-haproxy-haproxy-0 -o 'jsonpath={.spec.containers[*].name}' logger.go:42: 01:56:47 | gr-haproxy/4-check-password-leak | + containers='haproxy mysql-monit' logger.go:42: 01:56:47 | gr-haproxy/4-check-password-leak | + for c in '$containers' logger.go:42: 01:56:47 | gr-haproxy/4-check-password-leak | + kubectl -n kuttl-test-artistic-swift logs gr-haproxy-haproxy-0 -c haproxy logger.go:42: 01:56:47 | gr-haproxy/4-check-password-leak | + echo logs saved in: /tmp/kuttl/ps/gr-haproxy/logs_output-gr-haproxy-haproxy-0-haproxy.txt logger.go:42: 01:56:47 | gr-haproxy/4-check-password-leak | logs saved in: /tmp/kuttl/ps/gr-haproxy/logs_output-gr-haproxy-haproxy-0-haproxy.txt logger.go:42: 01:56:47 | gr-haproxy/4-check-password-leak | + for c in '$containers' logger.go:42: 01:56:47 | gr-haproxy/4-check-password-leak | + kubectl -n kuttl-test-artistic-swift logs gr-haproxy-haproxy-0 -c mysql-monit logger.go:42: 01:56:48 | gr-haproxy/4-check-password-leak | + echo logs saved in: /tmp/kuttl/ps/gr-haproxy/logs_output-gr-haproxy-haproxy-0-mysql-monit.txt logger.go:42: 01:56:48 | gr-haproxy/4-check-password-leak | logs saved in: /tmp/kuttl/ps/gr-haproxy/logs_output-gr-haproxy-haproxy-0-mysql-monit.txt logger.go:42: 01:56:48 | gr-haproxy/4-check-password-leak | + echo logger.go:42: 01:56:48 | gr-haproxy/4-check-password-leak | logger.go:42: 01:56:48 | gr-haproxy/4-check-password-leak | + for p in '$pods' logger.go:42: 01:56:48 | gr-haproxy/4-check-password-leak | ++ kubectl -n kuttl-test-artistic-swift get pod gr-haproxy-haproxy-1 -o 'jsonpath={.spec.containers[*].name}' logger.go:42: 01:56:48 | gr-haproxy/4-check-password-leak | + containers='haproxy mysql-monit' logger.go:42: 01:56:48 | gr-haproxy/4-check-password-leak | + for c in '$containers' logger.go:42: 01:56:48 | gr-haproxy/4-check-password-leak | + kubectl -n kuttl-test-artistic-swift logs gr-haproxy-haproxy-1 -c haproxy logger.go:42: 01:56:49 | gr-haproxy/4-check-password-leak | + echo logs saved in: /tmp/kuttl/ps/gr-haproxy/logs_output-gr-haproxy-haproxy-1-haproxy.txt logger.go:42: 01:56:49 | gr-haproxy/4-check-password-leak | logs saved in: /tmp/kuttl/ps/gr-haproxy/logs_output-gr-haproxy-haproxy-1-haproxy.txt logger.go:42: 01:56:49 | gr-haproxy/4-check-password-leak | + for c in '$containers' logger.go:42: 01:56:49 | gr-haproxy/4-check-password-leak | + kubectl -n kuttl-test-artistic-swift logs gr-haproxy-haproxy-1 -c mysql-monit logger.go:42: 01:56:50 | gr-haproxy/4-check-password-leak | + echo logs saved in: /tmp/kuttl/ps/gr-haproxy/logs_output-gr-haproxy-haproxy-1-mysql-monit.txt logger.go:42: 01:56:50 | gr-haproxy/4-check-password-leak | logs saved in: /tmp/kuttl/ps/gr-haproxy/logs_output-gr-haproxy-haproxy-1-mysql-monit.txt logger.go:42: 01:56:50 | gr-haproxy/4-check-password-leak | + echo logger.go:42: 01:56:50 | gr-haproxy/4-check-password-leak | logger.go:42: 01:56:50 | gr-haproxy/4-check-password-leak | + for p in '$pods' logger.go:42: 01:56:50 | gr-haproxy/4-check-password-leak | ++ kubectl -n kuttl-test-artistic-swift get pod gr-haproxy-haproxy-2 -o 'jsonpath={.spec.containers[*].name}' logger.go:42: 01:56:50 | gr-haproxy/4-check-password-leak | + containers='haproxy mysql-monit' logger.go:42: 01:56:50 | gr-haproxy/4-check-password-leak | + for c in '$containers' logger.go:42: 01:56:50 | gr-haproxy/4-check-password-leak | + kubectl -n kuttl-test-artistic-swift logs gr-haproxy-haproxy-2 -c haproxy logger.go:42: 01:56:51 | gr-haproxy/4-check-password-leak | + echo logs saved in: /tmp/kuttl/ps/gr-haproxy/logs_output-gr-haproxy-haproxy-2-haproxy.txt logger.go:42: 01:56:51 | gr-haproxy/4-check-password-leak | logs saved in: /tmp/kuttl/ps/gr-haproxy/logs_output-gr-haproxy-haproxy-2-haproxy.txt logger.go:42: 01:56:51 | gr-haproxy/4-check-password-leak | + for c in '$containers' logger.go:42: 01:56:51 | gr-haproxy/4-check-password-leak | + kubectl -n kuttl-test-artistic-swift logs gr-haproxy-haproxy-2 -c mysql-monit logger.go:42: 01:56:51 | gr-haproxy/4-check-password-leak | + echo logs saved in: /tmp/kuttl/ps/gr-haproxy/logs_output-gr-haproxy-haproxy-2-mysql-monit.txt logger.go:42: 01:56:51 | gr-haproxy/4-check-password-leak | logs saved in: /tmp/kuttl/ps/gr-haproxy/logs_output-gr-haproxy-haproxy-2-mysql-monit.txt logger.go:42: 01:56:51 | gr-haproxy/4-check-password-leak | + echo logger.go:42: 01:56:51 | gr-haproxy/4-check-password-leak | logger.go:42: 01:56:51 | gr-haproxy/4-check-password-leak | + for p in '$pods' logger.go:42: 01:56:51 | gr-haproxy/4-check-password-leak | ++ kubectl -n kuttl-test-artistic-swift get pod gr-haproxy-mysql-0 -o 'jsonpath={.spec.containers[*].name}' logger.go:42: 01:56:52 | gr-haproxy/4-check-password-leak | + containers='mysql xtrabackup' logger.go:42: 01:56:52 | gr-haproxy/4-check-password-leak | + for c in '$containers' logger.go:42: 01:56:52 | gr-haproxy/4-check-password-leak | + kubectl -n kuttl-test-artistic-swift logs gr-haproxy-mysql-0 -c mysql logger.go:42: 01:56:53 | gr-haproxy/4-check-password-leak | + echo logs saved in: /tmp/kuttl/ps/gr-haproxy/logs_output-gr-haproxy-mysql-0-mysql.txt logger.go:42: 01:56:53 | gr-haproxy/4-check-password-leak | logs saved in: /tmp/kuttl/ps/gr-haproxy/logs_output-gr-haproxy-mysql-0-mysql.txt logger.go:42: 01:56:53 | gr-haproxy/4-check-password-leak | + for c in '$containers' logger.go:42: 01:56:53 | gr-haproxy/4-check-password-leak | + kubectl -n kuttl-test-artistic-swift logs gr-haproxy-mysql-0 -c xtrabackup logger.go:42: 01:56:54 | gr-haproxy/4-check-password-leak | + echo logs saved in: /tmp/kuttl/ps/gr-haproxy/logs_output-gr-haproxy-mysql-0-xtrabackup.txt logger.go:42: 01:56:54 | gr-haproxy/4-check-password-leak | logs saved in: /tmp/kuttl/ps/gr-haproxy/logs_output-gr-haproxy-mysql-0-xtrabackup.txt logger.go:42: 01:56:54 | gr-haproxy/4-check-password-leak | + echo logger.go:42: 01:56:54 | gr-haproxy/4-check-password-leak | logger.go:42: 01:56:54 | gr-haproxy/4-check-password-leak | + for p in '$pods' logger.go:42: 01:56:54 | gr-haproxy/4-check-password-leak | ++ kubectl -n kuttl-test-artistic-swift get pod gr-haproxy-mysql-1 -o 'jsonpath={.spec.containers[*].name}' logger.go:42: 01:56:54 | gr-haproxy/4-check-password-leak | + containers='mysql xtrabackup' logger.go:42: 01:56:54 | gr-haproxy/4-check-password-leak | + for c in '$containers' logger.go:42: 01:56:54 | gr-haproxy/4-check-password-leak | + kubectl -n kuttl-test-artistic-swift logs gr-haproxy-mysql-1 -c mysql logger.go:42: 01:56:55 | gr-haproxy/4-check-password-leak | + echo logs saved in: /tmp/kuttl/ps/gr-haproxy/logs_output-gr-haproxy-mysql-1-mysql.txt logger.go:42: 01:56:55 | gr-haproxy/4-check-password-leak | logs saved in: /tmp/kuttl/ps/gr-haproxy/logs_output-gr-haproxy-mysql-1-mysql.txt logger.go:42: 01:56:55 | gr-haproxy/4-check-password-leak | + for c in '$containers' logger.go:42: 01:56:55 | gr-haproxy/4-check-password-leak | + kubectl -n kuttl-test-artistic-swift logs gr-haproxy-mysql-1 -c xtrabackup logger.go:42: 01:56:55 | gr-haproxy/4-check-password-leak | + echo logs saved in: /tmp/kuttl/ps/gr-haproxy/logs_output-gr-haproxy-mysql-1-xtrabackup.txt logger.go:42: 01:56:55 | gr-haproxy/4-check-password-leak | logs saved in: /tmp/kuttl/ps/gr-haproxy/logs_output-gr-haproxy-mysql-1-xtrabackup.txt logger.go:42: 01:56:55 | gr-haproxy/4-check-password-leak | + echo logger.go:42: 01:56:55 | gr-haproxy/4-check-password-leak | logger.go:42: 01:56:55 | gr-haproxy/4-check-password-leak | + for p in '$pods' logger.go:42: 01:56:55 | gr-haproxy/4-check-password-leak | ++ kubectl -n kuttl-test-artistic-swift get pod gr-haproxy-mysql-2 -o 'jsonpath={.spec.containers[*].name}' logger.go:42: 01:56:56 | gr-haproxy/4-check-password-leak | + containers='mysql xtrabackup' logger.go:42: 01:56:56 | gr-haproxy/4-check-password-leak | + for c in '$containers' logger.go:42: 01:56:56 | gr-haproxy/4-check-password-leak | + kubectl -n kuttl-test-artistic-swift logs gr-haproxy-mysql-2 -c mysql logger.go:42: 01:56:57 | gr-haproxy/4-check-password-leak | + echo logs saved in: /tmp/kuttl/ps/gr-haproxy/logs_output-gr-haproxy-mysql-2-mysql.txt logger.go:42: 01:56:57 | gr-haproxy/4-check-password-leak | logs saved in: /tmp/kuttl/ps/gr-haproxy/logs_output-gr-haproxy-mysql-2-mysql.txt logger.go:42: 01:56:57 | gr-haproxy/4-check-password-leak | + for c in '$containers' logger.go:42: 01:56:57 | gr-haproxy/4-check-password-leak | + kubectl -n kuttl-test-artistic-swift logs gr-haproxy-mysql-2 -c xtrabackup logger.go:42: 01:56:57 | gr-haproxy/4-check-password-leak | + echo logs saved in: /tmp/kuttl/ps/gr-haproxy/logs_output-gr-haproxy-mysql-2-xtrabackup.txt logger.go:42: 01:56:57 | gr-haproxy/4-check-password-leak | logs saved in: /tmp/kuttl/ps/gr-haproxy/logs_output-gr-haproxy-mysql-2-xtrabackup.txt logger.go:42: 01:56:57 | gr-haproxy/4-check-password-leak | + echo logger.go:42: 01:56:57 | gr-haproxy/4-check-password-leak | logger.go:42: 01:56:57 | gr-haproxy/4-check-password-leak | + for p in '$pods' logger.go:42: 01:56:57 | gr-haproxy/4-check-password-leak | ++ kubectl -n kuttl-test-artistic-swift get pod mysql-client -o 'jsonpath={.spec.containers[*].name}' logger.go:42: 01:56:58 | gr-haproxy/4-check-password-leak | + containers=mysql-client logger.go:42: 01:56:58 | gr-haproxy/4-check-password-leak | + for c in '$containers' logger.go:42: 01:56:58 | gr-haproxy/4-check-password-leak | + kubectl -n kuttl-test-artistic-swift logs mysql-client -c mysql-client logger.go:42: 01:56:58 | gr-haproxy/4-check-password-leak | + echo logs saved in: /tmp/kuttl/ps/gr-haproxy/logs_output-mysql-client-mysql-client.txt logger.go:42: 01:56:58 | gr-haproxy/4-check-password-leak | logs saved in: /tmp/kuttl/ps/gr-haproxy/logs_output-mysql-client-mysql-client.txt logger.go:42: 01:56:58 | gr-haproxy/4-check-password-leak | + echo logger.go:42: 01:56:58 | gr-haproxy/4-check-password-leak | logger.go:42: 01:56:58 | gr-haproxy/4-check-password-leak | + '[' -n ps-operator ']' logger.go:42: 01:56:58 | gr-haproxy/4-check-password-leak | ++ kubectl -n ps-operator get pods -o name logger.go:42: 01:56:58 | gr-haproxy/4-check-password-leak | ++ awk -F / '{print $2}' logger.go:42: 01:56:58 | gr-haproxy/4-check-password-leak | + pods=percona-server-mysql-operator-79466486c-pvt5d logger.go:42: 01:56:58 | gr-haproxy/4-check-password-leak | + collect_logs ps-operator logger.go:42: 01:56:58 | gr-haproxy/4-check-password-leak | + local containers logger.go:42: 01:56:58 | gr-haproxy/4-check-password-leak | + local count logger.go:42: 01:56:58 | gr-haproxy/4-check-password-leak | + NS=ps-operator logger.go:42: 01:56:58 | gr-haproxy/4-check-password-leak | + for p in '$pods' logger.go:42: 01:56:58 | gr-haproxy/4-check-password-leak | ++ kubectl -n ps-operator get pod percona-server-mysql-operator-79466486c-pvt5d -o 'jsonpath={.spec.containers[*].name}' logger.go:42: 01:56:59 | gr-haproxy/4-check-password-leak | + containers=manager logger.go:42: 01:56:59 | gr-haproxy/4-check-password-leak | + for c in '$containers' logger.go:42: 01:56:59 | gr-haproxy/4-check-password-leak | + kubectl -n ps-operator logs percona-server-mysql-operator-79466486c-pvt5d -c manager logger.go:42: 01:56:59 | gr-haproxy/4-check-password-leak | + echo logs saved in: /tmp/kuttl/ps/gr-haproxy/logs_output-percona-server-mysql-operator-79466486c-pvt5d-manager.txt logger.go:42: 01:56:59 | gr-haproxy/4-check-password-leak | logs saved in: /tmp/kuttl/ps/gr-haproxy/logs_output-percona-server-mysql-operator-79466486c-pvt5d-manager.txt logger.go:42: 01:56:59 | gr-haproxy/4-check-password-leak | + echo logger.go:42: 01:56:59 | gr-haproxy/4-check-password-leak | logger.go:42: 01:56:59 | gr-haproxy/4-check-password-leak | test step completed 4-check-password-leak logger.go:42: 01:56:59 | gr-haproxy/98-drop-finalizer | starting test step 98-drop-finalizer logger.go:42: 01:57:00 | gr-haproxy/98-drop-finalizer | PerconaServerMySQL:kuttl-test-artistic-swift/gr-haproxy updated logger.go:42: 01:57:00 | gr-haproxy/98-drop-finalizer | test step completed 98-drop-finalizer logger.go:42: 01:57:00 | gr-haproxy/99-remove-cluster-gracefully | starting test step 99-remove-cluster-gracefully logger.go:42: 01:57:00 | gr-haproxy/99-remove-cluster-gracefully | running command: [sh -c set -o errexit set -o xtrace source ../../functions destroy_operator] logger.go:42: 01:57:00 | gr-haproxy/99-remove-cluster-gracefully | + source ../../functions logger.go:42: 01:57:00 | gr-haproxy/99-remove-cluster-gracefully | +++ realpath ../../.. logger.go:42: 01:57:00 | gr-haproxy/99-remove-cluster-gracefully | ++ ROOT_REPO=/mnt/jenkins/workspace/cloud-ps-operator_PR-753 logger.go:42: 01:57:00 | gr-haproxy/99-remove-cluster-gracefully | ++++ pwd logger.go:42: 01:57:00 | gr-haproxy/99-remove-cluster-gracefully | +++ basename /mnt/jenkins/workspace/cloud-ps-operator_PR-753/e2e-tests/tests/gr-haproxy logger.go:42: 01:57:00 | gr-haproxy/99-remove-cluster-gracefully | ++ test_name=gr-haproxy logger.go:42: 01:57:00 | gr-haproxy/99-remove-cluster-gracefully | ++ source /mnt/jenkins/workspace/cloud-ps-operator_PR-753/e2e-tests/vars.sh logger.go:42: 01:57:00 | gr-haproxy/99-remove-cluster-gracefully | +++ export ROOT_REPO=/mnt/jenkins/workspace/cloud-ps-operator_PR-753 logger.go:42: 01:57:00 | gr-haproxy/99-remove-cluster-gracefully | +++ ROOT_REPO=/mnt/jenkins/workspace/cloud-ps-operator_PR-753 logger.go:42: 01:57:00 | gr-haproxy/99-remove-cluster-gracefully | +++ export DEPLOY_DIR=/mnt/jenkins/workspace/cloud-ps-operator_PR-753/deploy logger.go:42: 01:57:00 | gr-haproxy/99-remove-cluster-gracefully | +++ DEPLOY_DIR=/mnt/jenkins/workspace/cloud-ps-operator_PR-753/deploy logger.go:42: 01:57:00 | gr-haproxy/99-remove-cluster-gracefully | +++ export TESTS_DIR=/mnt/jenkins/workspace/cloud-ps-operator_PR-753/e2e-tests logger.go:42: 01:57:00 | gr-haproxy/99-remove-cluster-gracefully | +++ TESTS_DIR=/mnt/jenkins/workspace/cloud-ps-operator_PR-753/e2e-tests logger.go:42: 01:57:00 | gr-haproxy/99-remove-cluster-gracefully | +++ export TESTS_CONFIG_DIR=/mnt/jenkins/workspace/cloud-ps-operator_PR-753/e2e-tests/conf logger.go:42: 01:57:00 | gr-haproxy/99-remove-cluster-gracefully | +++ TESTS_CONFIG_DIR=/mnt/jenkins/workspace/cloud-ps-operator_PR-753/e2e-tests/conf logger.go:42: 01:57:00 | gr-haproxy/99-remove-cluster-gracefully | +++ export TEMP_DIR=/tmp/kuttl/ps/gr-haproxy logger.go:42: 01:57:00 | gr-haproxy/99-remove-cluster-gracefully | +++ TEMP_DIR=/tmp/kuttl/ps/gr-haproxy logger.go:42: 01:57:00 | gr-haproxy/99-remove-cluster-gracefully | ++++ git rev-parse --abbrev-ref HEAD logger.go:42: 01:57:00 | gr-haproxy/99-remove-cluster-gracefully | +++ export GIT_BRANCH=PR-753 logger.go:42: 01:57:00 | gr-haproxy/99-remove-cluster-gracefully | +++ GIT_BRANCH=PR-753 logger.go:42: 01:57:00 | gr-haproxy/99-remove-cluster-gracefully | +++ export VERSION=PR-753-8f2a8b69 logger.go:42: 01:57:00 | gr-haproxy/99-remove-cluster-gracefully | +++ VERSION=PR-753-8f2a8b69 logger.go:42: 01:57:00 | gr-haproxy/99-remove-cluster-gracefully | +++ export IMAGE=perconalab/percona-server-mysql-operator:PR-753-8f2a8b69 logger.go:42: 01:57:00 | gr-haproxy/99-remove-cluster-gracefully | +++ IMAGE=perconalab/percona-server-mysql-operator:PR-753-8f2a8b69 logger.go:42: 01:57:00 | gr-haproxy/99-remove-cluster-gracefully | +++ export IMAGE_MYSQL=perconalab/percona-server-mysql-operator:main-psmysql logger.go:42: 01:57:00 | gr-haproxy/99-remove-cluster-gracefully | +++ IMAGE_MYSQL=perconalab/percona-server-mysql-operator:main-psmysql logger.go:42: 01:57:00 | gr-haproxy/99-remove-cluster-gracefully | +++ export IMAGE_BACKUP=perconalab/percona-server-mysql-operator:main-backup logger.go:42: 01:57:00 | gr-haproxy/99-remove-cluster-gracefully | +++ IMAGE_BACKUP=perconalab/percona-server-mysql-operator:main-backup logger.go:42: 01:57:00 | gr-haproxy/99-remove-cluster-gracefully | +++ export IMAGE_ORCHESTRATOR=perconalab/percona-server-mysql-operator:main-orchestrator logger.go:42: 01:57:00 | gr-haproxy/99-remove-cluster-gracefully | +++ IMAGE_ORCHESTRATOR=perconalab/percona-server-mysql-operator:main-orchestrator logger.go:42: 01:57:00 | gr-haproxy/99-remove-cluster-gracefully | +++ export IMAGE_ROUTER=perconalab/percona-server-mysql-operator:main-router logger.go:42: 01:57:00 | gr-haproxy/99-remove-cluster-gracefully | +++ IMAGE_ROUTER=perconalab/percona-server-mysql-operator:main-router logger.go:42: 01:57:00 | gr-haproxy/99-remove-cluster-gracefully | +++ export IMAGE_TOOLKIT=perconalab/percona-server-mysql-operator:main-toolkit logger.go:42: 01:57:00 | gr-haproxy/99-remove-cluster-gracefully | +++ IMAGE_TOOLKIT=perconalab/percona-server-mysql-operator:main-toolkit logger.go:42: 01:57:00 | gr-haproxy/99-remove-cluster-gracefully | +++ export IMAGE_HAPROXY=perconalab/percona-server-mysql-operator:main-haproxy logger.go:42: 01:57:00 | gr-haproxy/99-remove-cluster-gracefully | +++ IMAGE_HAPROXY=perconalab/percona-server-mysql-operator:main-haproxy logger.go:42: 01:57:00 | gr-haproxy/99-remove-cluster-gracefully | +++ export PMM_SERVER_VERSION=9.9.9 logger.go:42: 01:57:00 | gr-haproxy/99-remove-cluster-gracefully | +++ PMM_SERVER_VERSION=9.9.9 logger.go:42: 01:57:00 | gr-haproxy/99-remove-cluster-gracefully | +++ export IMAGE_PMM_CLIENT=perconalab/pmm-client:dev-latest logger.go:42: 01:57:00 | gr-haproxy/99-remove-cluster-gracefully | +++ IMAGE_PMM_CLIENT=perconalab/pmm-client:dev-latest logger.go:42: 01:57:00 | gr-haproxy/99-remove-cluster-gracefully | +++ export IMAGE_PMM_SERVER=perconalab/pmm-server:dev-latest logger.go:42: 01:57:00 | gr-haproxy/99-remove-cluster-gracefully | +++ IMAGE_PMM_SERVER=perconalab/pmm-server:dev-latest logger.go:42: 01:57:00 | gr-haproxy/99-remove-cluster-gracefully | +++ export CERT_MANAGER_VER=1.15.1 logger.go:42: 01:57:00 | gr-haproxy/99-remove-cluster-gracefully | +++ CERT_MANAGER_VER=1.15.1 logger.go:42: 01:57:00 | gr-haproxy/99-remove-cluster-gracefully | ++++ which gdate logger.go:42: 01:57:00 | gr-haproxy/99-remove-cluster-gracefully | which: no gdate in (/mnt/jenkins/workspace/cloud-ps-operator_PR-753/bin/:/home/ec2-user/.krew/bin:/usr/local/bin:/usr/bin) logger.go:42: 01:57:00 | gr-haproxy/99-remove-cluster-gracefully | ++++ which date logger.go:42: 01:57:00 | gr-haproxy/99-remove-cluster-gracefully | +++ date=/usr/bin/date logger.go:42: 01:57:00 | gr-haproxy/99-remove-cluster-gracefully | +++ command -v oc logger.go:42: 01:57:00 | gr-haproxy/99-remove-cluster-gracefully | +++ kubectl get nodes logger.go:42: 01:57:00 | gr-haproxy/99-remove-cluster-gracefully | +++ grep '^minikube' logger.go:42: 01:57:01 | gr-haproxy/99-remove-cluster-gracefully | + destroy_operator logger.go:42: 01:57:01 | gr-haproxy/99-remove-cluster-gracefully | + kubectl -n ps-operator delete deployment percona-server-mysql-operator --force --grace-period=0 logger.go:42: 01:57:01 | gr-haproxy/99-remove-cluster-gracefully | Warning: Immediate deletion does not wait for confirmation that the running resource has been terminated. The resource may continue to run on the cluster indefinitely. logger.go:42: 01:57:01 | gr-haproxy/99-remove-cluster-gracefully | deployment.apps "percona-server-mysql-operator" force deleted logger.go:42: 01:57:01 | gr-haproxy/99-remove-cluster-gracefully | + [[ -n ps-operator ]] logger.go:42: 01:57:01 | gr-haproxy/99-remove-cluster-gracefully | + kubectl delete namespace ps-operator --force --grace-period=0 logger.go:42: 01:57:01 | gr-haproxy/99-remove-cluster-gracefully | Warning: Immediate deletion does not wait for confirmation that the running resource has been terminated. The resource may continue to run on the cluster indefinitely. logger.go:42: 01:57:02 | gr-haproxy/99-remove-cluster-gracefully | namespace "ps-operator" force deleted logger.go:42: 01:57:07 | gr-haproxy/99-remove-cluster-gracefully | test step completed 99-remove-cluster-gracefully logger.go:42: 01:57:08 | gr-haproxy | gr-haproxy events from ns kuttl-test-artistic-swift: logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:51:12 +0000 UTC Normal Pod mysql-client Scheduled Successfully assigned kuttl-test-artistic-swift/mysql-client to gke-jen-ps-753-8f2a8b69--default-pool-ed4d2ff0-xl9q default-scheduler logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:51:12 +0000 UTC Normal Pod mysql-client.spec.containers{mysql-client} Pulling Pulling image "percona/percona-server:8.0.33" kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:51:15 +0000 UTC Normal Pod mysql-client TaintManagerEviction Cancelling deletion of Pod kuttl-test-artistic-swift/mysql-client taint-controller logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:51:24 +0000 UTC Normal PersistentVolumeClaim datadir-gr-haproxy-mysql-0 WaitForFirstConsumer waiting for first consumer to be created before binding persistentvolume-controller logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:51:24 +0000 UTC Normal PersistentVolumeClaim datadir-gr-haproxy-mysql-0 Provisioning External provisioner is provisioning volume for claim "kuttl-test-artistic-swift/datadir-gr-haproxy-mysql-0" pd.csi.storage.gke.io_gke-d0da6129b5eb4610bf17-7f04-aeb9-vm_a4476989-4096-43d3-b8a6-12ceb417008b logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:51:24 +0000 UTC Normal PersistentVolumeClaim datadir-gr-haproxy-mysql-0 ExternalProvisioning Waiting for a volume to be created either by the external provisioner 'pd.csi.storage.gke.io' or manually by the system administrator. If volume creation is delayed, please verify that the provisioner is running and correctly registered. persistentvolume-controller logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:51:24 +0000 UTC Normal StatefulSet.apps gr-haproxy-mysql SuccessfulCreate create Claim datadir-gr-haproxy-mysql-0 Pod gr-haproxy-mysql-0 in StatefulSet gr-haproxy-mysql success statefulset-controller logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:51:24 +0000 UTC Normal StatefulSet.apps gr-haproxy-mysql SuccessfulCreate create Pod gr-haproxy-mysql-0 in StatefulSet gr-haproxy-mysql successful statefulset-controller logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:51:28 +0000 UTC Normal PersistentVolumeClaim datadir-gr-haproxy-mysql-0 ProvisioningSucceeded Successfully provisioned volume pvc-4743c4e9-5d0c-425e-b8a1-d44366ea5704 pd.csi.storage.gke.io_gke-d0da6129b5eb4610bf17-7f04-aeb9-vm_a4476989-4096-43d3-b8a6-12ceb417008b logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:51:28 +0000 UTC Normal Pod gr-haproxy-mysql-0 Scheduled Successfully assigned kuttl-test-artistic-swift/gr-haproxy-mysql-0 to gke-jen-ps-753-8f2a8b69--default-pool-ed4d2ff0-xl9q default-scheduler logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:51:35 +0000 UTC Normal Pod gr-haproxy-mysql-0 SuccessfulAttachVolume AttachVolume.Attach succeeded for volume "pvc-4743c4e9-5d0c-425e-b8a1-d44366ea5704" attachdetach-controller logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:51:37 +0000 UTC Normal Pod gr-haproxy-mysql-0.spec.initContainers{mysql-init} Pulling Pulling image "perconalab/percona-server-mysql-operator:PR-753-8f2a8b69" kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:51:43 +0000 UTC Normal Pod mysql-client.spec.containers{mysql-client} Pulled Successfully pulled image "percona/percona-server:8.0.33" in 30.93s (30.93s including waiting) kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:51:43 +0000 UTC Normal Pod mysql-client.spec.containers{mysql-client} Created Created container mysql-client kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:51:43 +0000 UTC Normal Pod mysql-client.spec.containers{mysql-client} Started Started container mysql-client kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:51:46 +0000 UTC Normal Pod gr-haproxy-mysql-0.spec.initContainers{mysql-init} Pulled Successfully pulled image "perconalab/percona-server-mysql-operator:PR-753-8f2a8b69" in 9.123s (9.123s including waiting) kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:51:46 +0000 UTC Normal Pod gr-haproxy-mysql-0.spec.initContainers{mysql-init} Created Created container mysql-init kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:51:46 +0000 UTC Normal Pod gr-haproxy-mysql-0.spec.initContainers{mysql-init} Started Started container mysql-init kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:51:53 +0000 UTC Normal Pod gr-haproxy-mysql-0.spec.containers{mysql} Pulling Pulling image "perconalab/percona-server-mysql-operator:main-psmysql" kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:52:17 +0000 UTC Normal Pod gr-haproxy-mysql-0.spec.containers{mysql} Pulled Successfully pulled image "perconalab/percona-server-mysql-operator:main-psmysql" in 24.219s (24.219s including waiting) kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:52:17 +0000 UTC Normal Pod gr-haproxy-mysql-0.spec.containers{mysql} Created Created container mysql kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:52:17 +0000 UTC Normal Pod gr-haproxy-mysql-0.spec.containers{mysql} Started Started container mysql kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:52:17 +0000 UTC Normal Pod gr-haproxy-mysql-0.spec.containers{xtrabackup} Pulling Pulling image "perconalab/percona-server-mysql-operator:main-backup" kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:52:26 +0000 UTC Normal Pod gr-haproxy-mysql-0.spec.containers{xtrabackup} Pulled Successfully pulled image "perconalab/percona-server-mysql-operator:main-backup" in 8.242s (8.242s including waiting) kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:52:26 +0000 UTC Normal Pod gr-haproxy-mysql-0.spec.containers{xtrabackup} Created Created container xtrabackup kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:52:26 +0000 UTC Normal Pod gr-haproxy-mysql-0.spec.containers{xtrabackup} Started Started container xtrabackup kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:52:47 +0000 UTC Normal PersistentVolumeClaim datadir-gr-haproxy-mysql-1 WaitForFirstConsumer waiting for first consumer to be created before binding persistentvolume-controller logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:52:47 +0000 UTC Normal PersistentVolumeClaim datadir-gr-haproxy-mysql-1 ExternalProvisioning Waiting for a volume to be created either by the external provisioner 'pd.csi.storage.gke.io' or manually by the system administrator. If volume creation is delayed, please verify that the provisioner is running and correctly registered. persistentvolume-controller logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:52:47 +0000 UTC Normal PersistentVolumeClaim datadir-gr-haproxy-mysql-1 Provisioning External provisioner is provisioning volume for claim "kuttl-test-artistic-swift/datadir-gr-haproxy-mysql-1" pd.csi.storage.gke.io_gke-d0da6129b5eb4610bf17-7f04-aeb9-vm_a4476989-4096-43d3-b8a6-12ceb417008b logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:52:47 +0000 UTC Normal StatefulSet.apps gr-haproxy-mysql SuccessfulCreate create Claim datadir-gr-haproxy-mysql-1 Pod gr-haproxy-mysql-1 in StatefulSet gr-haproxy-mysql success statefulset-controller logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:52:47 +0000 UTC Normal StatefulSet.apps gr-haproxy-mysql SuccessfulCreate create Pod gr-haproxy-mysql-1 in StatefulSet gr-haproxy-mysql successful statefulset-controller logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:52:50 +0000 UTC Normal Pod gr-haproxy-haproxy-0 Scheduled Successfully assigned kuttl-test-artistic-swift/gr-haproxy-haproxy-0 to gke-jen-ps-753-8f2a8b69--default-pool-ed4d2ff0-2g2d default-scheduler logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:52:50 +0000 UTC Normal StatefulSet.apps gr-haproxy-haproxy SuccessfulCreate create Pod gr-haproxy-haproxy-0 in StatefulSet gr-haproxy-haproxy successful statefulset-controller logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:52:51 +0000 UTC Normal PersistentVolumeClaim datadir-gr-haproxy-mysql-1 ProvisioningSucceeded Successfully provisioned volume pvc-31bdc18a-71d6-4bf0-be02-76b9468387ba pd.csi.storage.gke.io_gke-d0da6129b5eb4610bf17-7f04-aeb9-vm_a4476989-4096-43d3-b8a6-12ceb417008b logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:52:51 +0000 UTC Normal Pod gr-haproxy-haproxy-0.spec.initContainers{haproxy-init} Pulling Pulling image "perconalab/percona-server-mysql-operator:PR-753-8f2a8b69" kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:52:51 +0000 UTC Normal Pod gr-haproxy-mysql-1 Scheduled Successfully assigned kuttl-test-artistic-swift/gr-haproxy-mysql-1 to gke-jen-ps-753-8f2a8b69--default-pool-ed4d2ff0-2g2d default-scheduler logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:52:56 +0000 UTC Normal Pod gr-haproxy-haproxy-0.spec.initContainers{haproxy-init} Pulled Successfully pulled image "perconalab/percona-server-mysql-operator:PR-753-8f2a8b69" in 5.21s (5.21s including waiting) kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:52:56 +0000 UTC Normal Pod gr-haproxy-haproxy-0.spec.initContainers{haproxy-init} Created Created container haproxy-init kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:52:56 +0000 UTC Normal Pod gr-haproxy-haproxy-0.spec.initContainers{haproxy-init} Started Started container haproxy-init kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:52:58 +0000 UTC Normal Pod gr-haproxy-mysql-1 SuccessfulAttachVolume AttachVolume.Attach succeeded for volume "pvc-31bdc18a-71d6-4bf0-be02-76b9468387ba" attachdetach-controller logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:53:00 +0000 UTC Normal Pod gr-haproxy-haproxy-0.spec.containers{haproxy} Pulling Pulling image "perconalab/percona-server-mysql-operator:main-haproxy" kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:53:00 +0000 UTC Normal Pod gr-haproxy-mysql-1.spec.initContainers{mysql-init} Pulling Pulling image "perconalab/percona-server-mysql-operator:PR-753-8f2a8b69" kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:53:00 +0000 UTC Normal Pod gr-haproxy-mysql-1.spec.initContainers{mysql-init} Pulled Successfully pulled image "perconalab/percona-server-mysql-operator:PR-753-8f2a8b69" in 138ms (138ms including waiting) kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:53:00 +0000 UTC Normal Pod gr-haproxy-mysql-1.spec.initContainers{mysql-init} Created Created container mysql-init kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:53:00 +0000 UTC Normal Pod gr-haproxy-mysql-1.spec.initContainers{mysql-init} Started Started container mysql-init kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:53:03 +0000 UTC Normal Pod gr-haproxy-mysql-1.spec.containers{mysql} Pulling Pulling image "perconalab/percona-server-mysql-operator:main-psmysql" kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:53:05 +0000 UTC Normal Pod gr-haproxy-haproxy-0.spec.containers{haproxy} Pulled Successfully pulled image "perconalab/percona-server-mysql-operator:main-haproxy" in 5.061s (5.061s including waiting) kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:53:05 +0000 UTC Normal Pod gr-haproxy-haproxy-0.spec.containers{haproxy} Created Created container haproxy kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:53:05 +0000 UTC Normal Pod gr-haproxy-haproxy-0.spec.containers{haproxy} Started Started container haproxy kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:53:05 +0000 UTC Normal Pod gr-haproxy-haproxy-0.spec.containers{mysql-monit} Pulling Pulling image "perconalab/percona-server-mysql-operator:main-haproxy" kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:53:05 +0000 UTC Normal Pod gr-haproxy-haproxy-0.spec.containers{mysql-monit} Pulled Successfully pulled image "perconalab/percona-server-mysql-operator:main-haproxy" in 122ms (122ms including waiting) kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:53:05 +0000 UTC Normal Pod gr-haproxy-haproxy-0.spec.containers{mysql-monit} Created Created container mysql-monit kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:53:05 +0000 UTC Normal Pod gr-haproxy-haproxy-0.spec.containers{mysql-monit} Started Started container mysql-monit kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:53:06 +0000 UTC Normal Pod gr-haproxy-haproxy-1 Scheduled Successfully assigned kuttl-test-artistic-swift/gr-haproxy-haproxy-1 to gke-jen-ps-753-8f2a8b69--default-pool-ed4d2ff0-xl9q default-scheduler logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:53:06 +0000 UTC Normal Pod gr-haproxy-haproxy-1.spec.initContainers{haproxy-init} Pulling Pulling image "perconalab/percona-server-mysql-operator:PR-753-8f2a8b69" kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:53:06 +0000 UTC Normal Pod gr-haproxy-haproxy-1.spec.initContainers{haproxy-init} Pulled Successfully pulled image "perconalab/percona-server-mysql-operator:PR-753-8f2a8b69" in 105ms (105ms including waiting) kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:53:06 +0000 UTC Normal Pod gr-haproxy-haproxy-1.spec.initContainers{haproxy-init} Created Created container haproxy-init kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:53:06 +0000 UTC Normal Pod gr-haproxy-haproxy-1.spec.initContainers{haproxy-init} Started Started container haproxy-init kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:53:06 +0000 UTC Normal StatefulSet.apps gr-haproxy-haproxy SuccessfulCreate create Pod gr-haproxy-haproxy-1 in StatefulSet gr-haproxy-haproxy successful statefulset-controller logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:53:08 +0000 UTC Normal Pod gr-haproxy-haproxy-1.spec.containers{haproxy} Pulling Pulling image "perconalab/percona-server-mysql-operator:main-haproxy" kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:53:12 +0000 UTC Normal Pod gr-haproxy-haproxy-1.spec.containers{haproxy} Pulled Successfully pulled image "perconalab/percona-server-mysql-operator:main-haproxy" in 3.553s (3.553s including waiting) kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:53:12 +0000 UTC Normal Pod gr-haproxy-haproxy-1.spec.containers{haproxy} Created Created container haproxy kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:53:12 +0000 UTC Normal Pod gr-haproxy-haproxy-1.spec.containers{haproxy} Started Started container haproxy kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:53:12 +0000 UTC Normal Pod gr-haproxy-haproxy-1.spec.containers{mysql-monit} Pulling Pulling image "perconalab/percona-server-mysql-operator:main-haproxy" kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:53:12 +0000 UTC Normal Pod gr-haproxy-haproxy-1.spec.containers{mysql-monit} Pulled Successfully pulled image "perconalab/percona-server-mysql-operator:main-haproxy" in 111ms (111ms including waiting) kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:53:12 +0000 UTC Normal Pod gr-haproxy-haproxy-1.spec.containers{mysql-monit} Created Created container mysql-monit kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:53:12 +0000 UTC Normal Pod gr-haproxy-haproxy-1.spec.containers{mysql-monit} Started Started container mysql-monit kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:53:12 +0000 UTC Normal Pod gr-haproxy-haproxy-2 Scheduled Successfully assigned kuttl-test-artistic-swift/gr-haproxy-haproxy-2 to gke-jen-ps-753-8f2a8b69--default-pool-ed4d2ff0-3lk9 default-scheduler logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:53:12 +0000 UTC Normal StatefulSet.apps gr-haproxy-haproxy SuccessfulCreate create Pod gr-haproxy-haproxy-2 in StatefulSet gr-haproxy-haproxy successful statefulset-controller logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:53:13 +0000 UTC Normal Pod gr-haproxy-haproxy-2.spec.initContainers{haproxy-init} Pulling Pulling image "perconalab/percona-server-mysql-operator:PR-753-8f2a8b69" kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:53:13 +0000 UTC Normal Pod gr-haproxy-haproxy-2.spec.initContainers{haproxy-init} Pulled Successfully pulled image "perconalab/percona-server-mysql-operator:PR-753-8f2a8b69" in 97ms (97ms including waiting) kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:53:13 +0000 UTC Normal Pod gr-haproxy-haproxy-2.spec.initContainers{haproxy-init} Created Created container haproxy-init kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:53:13 +0000 UTC Normal Pod gr-haproxy-haproxy-2.spec.initContainers{haproxy-init} Started Started container haproxy-init kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:53:15 +0000 UTC Normal Pod gr-haproxy-haproxy-2.spec.containers{haproxy} Pulling Pulling image "perconalab/percona-server-mysql-operator:main-haproxy" kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:53:15 +0000 UTC Normal Pod gr-haproxy-haproxy-2.spec.containers{haproxy} Pulled Successfully pulled image "perconalab/percona-server-mysql-operator:main-haproxy" in 90ms (90ms including waiting) kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:53:15 +0000 UTC Normal Pod gr-haproxy-haproxy-2.spec.containers{haproxy} Created Created container haproxy kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:53:15 +0000 UTC Normal Pod gr-haproxy-haproxy-2.spec.containers{haproxy} Started Started container haproxy kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:53:15 +0000 UTC Normal Pod gr-haproxy-haproxy-2.spec.containers{mysql-monit} Pulling Pulling image "perconalab/percona-server-mysql-operator:main-haproxy" kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:53:15 +0000 UTC Normal Pod gr-haproxy-haproxy-2.spec.containers{mysql-monit} Pulled Successfully pulled image "perconalab/percona-server-mysql-operator:main-haproxy" in 81ms (81ms including waiting) kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:53:15 +0000 UTC Normal Pod gr-haproxy-haproxy-2.spec.containers{mysql-monit} Created Created container mysql-monit kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:53:16 +0000 UTC Normal Pod gr-haproxy-haproxy-2.spec.containers{mysql-monit} Started Started container mysql-monit kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:53:28 +0000 UTC Normal Pod gr-haproxy-mysql-1.spec.containers{mysql} Pulled Successfully pulled image "perconalab/percona-server-mysql-operator:main-psmysql" in 24.922s (24.922s including waiting) kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:53:28 +0000 UTC Normal Pod gr-haproxy-mysql-1.spec.containers{mysql} Created Created container mysql kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:53:28 +0000 UTC Normal Pod gr-haproxy-mysql-1.spec.containers{mysql} Started Started container mysql kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:53:28 +0000 UTC Normal Pod gr-haproxy-mysql-1.spec.containers{xtrabackup} Pulling Pulling image "perconalab/percona-server-mysql-operator:main-backup" kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:53:37 +0000 UTC Normal Pod gr-haproxy-mysql-1.spec.containers{xtrabackup} Pulled Successfully pulled image "perconalab/percona-server-mysql-operator:main-backup" in 9.649s (9.649s including waiting) kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:53:38 +0000 UTC Normal Pod gr-haproxy-mysql-1.spec.containers{xtrabackup} Created Created container xtrabackup kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:53:38 +0000 UTC Normal Pod gr-haproxy-mysql-1.spec.containers{xtrabackup} Started Started container xtrabackup kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:53:50 +0000 UTC Warning Pod gr-haproxy-mysql-1.spec.containers{mysql} Unhealthy Startup probe failed: 2024/10/02 01:53:49 Bootstrap starting... 2024/10/02 01:53:49 Running dba.configureLocalInstance('operator:*****@gr-haproxy-mysql-1.gr-haproxy-mysql.kuttl-test-artistic-swift', {'clearReadOnly': true}) WARNING: Using a password on the command line interface can be insecure. MySQL Error 2003 (HY000): Can't connect to MySQL server on 'gr-haproxy-mysql-1.gr-haproxy-mysql.kuttl-test-artistic-swift:3306' (111) 2024/10/02 01:53:50 bootstrap finished in 0.398313 seconds 2024/10/02 01:53:50 bootstrap failed: configure local instance: exit status 1 kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:53:50 +0000 UTC Normal Pod gr-haproxy-mysql-1.spec.containers{mysql} Killing Container mysql failed startup probe, will be restarted kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:53:50 +0000 UTC Warning Pod gr-haproxy-mysql-1.spec.containers{mysql} FailedPreStopHook PreStopHook failed kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:53:56 +0000 UTC Normal Pod gr-haproxy-mysql-1.spec.containers{mysql} Pulled Successfully pulled image "perconalab/percona-server-mysql-operator:main-psmysql" in 105ms (105ms including waiting) kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:54:33 +0000 UTC Warning Pod gr-haproxy-mysql-1.spec.containers{mysql} Unhealthy Startup probe failed: 2024/10/02 01:54:19 Bootstrap starting... 2024/10/02 01:54:19 Running dba.configureLocalInstance('operator:*****@gr-haproxy-mysql-1.gr-haproxy-mysql.kuttl-test-artistic-swift', {'clearReadOnly': true}) WARNING: Using a password on the command line interface can be insecure. WARNING: The clearReadOnly option is deprecated and will be removed in a future release. WARNING: This function is deprecated and will be removed in a future release of MySQL Shell, use dba.configureInstance() instead. Configuring local MySQL instance listening at port 3306 for use in an InnoDB cluster... This instance reports its own address as gr-haproxy-mysql-1.gr-haproxy-mysql.kuttl-test-artistic-swift:3306 applierWorkerThreads will be set to the default value of 4. NOTE: Some configuration options need to be fixed: +----------------------------------------+---------------+----------------+----------------------------+ +----------------------------------------+---------------+----------------+----------------------------+ | Variable | Current Value | Required Value | Note |+----------------------------------------+---------------+----------------+----------------------------+ | binlog_transaction_dependency_tracking | COMMIT_ORDER | WRITESET | Update the server variable |Disabled super_read_only on the instance 'gr-haproxy-mysql-1.gr-haproxy-mysql.kuttl-test-artistic-swift:3306' Enabling super_read_only on the instance 'gr-haproxy-mysql-1.gr-haproxy-mysql.kuttl-test-artistic-swift:3306' Configuring instance... WARNING:*****@binlog_transaction_dependency_tracking' is deprecated and will be removed in a future release. (Code 1287). The instance 'gr-haproxy-mysql-1.gr-haproxy-mysql.kuttl-test-artistic-swift:3306' was configured to be used in an InnoDB cluster. 2024/10/02 01:54:20 Instance (gr-haproxy-mysql-1.gr-haproxy-mysql.kuttl-test-artistic-swift) configured to join to the InnoDB cluster 2024/10/02 01:54:20 peers: [gr-haproxy-mysql-0.gr-haproxy-mysql.kuttl-test-artistic-swift gr-haproxy-mysql-1.gr-haproxy-mysql.kuttl-test-artistic-swift] 2024/10/02 01:54:20 Running dba.getCluster('grhaproxy') WARNING: Using a password on the command line interface can be insecure. 2024/10/02 01:54:21 Connected to peer gr-haproxy-mysql-0.gr-haproxy-mysql.kuttl-test-artistic-swift 2024/10/02 01:54:21 Cluster status: ClusterName: grhaproxy Status: OK_NO_TOLERANCE StatusText: Cluster is NOT tolerant to any failures. SSL: REQUIRED Primary: gr-haproxy-mysql-0.gr-haproxy-mysql.kuttl-test-artistic-swift:3306 Topology: Member 0 Address: gr-haproxy-mysql-0.gr-haproxy-mysql.kuttl-test-artistic-swift:3306 State: ONLINE Errors: [] 2024/10/02 01:54:21 Adding instance (gr-haproxy-mysql-1.gr-haproxy-mysql.kuttl-test-artistic-swift) to InnoDB cluster 2024/10/02 01:54:21 Running dba.getCluster('grhaproxy').addInstance('operator:*****@gr-haproxy-mysql-1.gr-haproxy-mysql.kuttl-test-artistic-swift', {'recoveryMethod': 'clone', 'waitRecovery': 3}) WARNING: Using a password on the command line interface can be insecure. WARNING: The waitRecovery option is deprecated. Please use the recoveryProgress option instead. NOTE: The target instance 'gr-haproxy-mysql-1.gr-haproxy-mysql.kuttl-test-artistic-swift:3306' has not been pre-provisioned (GTID set is empty). The Shell is unable to decide whether incremental state recovery can correctly provision it. Clone based recovery selected through the recoveryMethod option Validating instance configuration at gr-haproxy-mysql-1.gr-haproxy-mysql.kuttl-test-artistic-swift:3306... This instance reports its own address as gr-haproxy-mysql-1.gr-haproxy-mysql.kuttl-test-artistic-swift:3306 Instance configuration is suitable. NOTE: Group Replication will communicate with other members using 'gr-haproxy-mysql-1.gr-haproxy-mysql.kuttl-test-artistic-swift:3306'. Use the localAddress option to override. * Checking connectivity and SSL configuration... A new instance will be added to the InnoDB Cluster. Depending on the amount of data on the cluster this might take from a few seconds to several hours. Adding instance to the cluster... Monitoring recovery process of the new cluster member. Press ^C to stop monitoring and let it continue in background. Clone based state recovery is now in progress. NOTE: A server restart is expected to happen as part of the clone process. If the server does not support the RESTART command or does not come back after a while, you may need to manually start it back. * Waiting for clone to finish... NOTE: gr-haproxy-mysql-1.gr-haproxy-mysql.kuttl-test-artistic-swift:3306 is being cloned from gr-haproxy-mysql-0.gr-haproxy-mysql.kuttl-test-artistic-swift:3306 ** Stage DROP DATA: Completed ** Clone Transfer FILE COPY 0% In Progress PAGE COPY 0% Not Started REDO COPY 0% Not Started** Clone Transfer FILE COPY 100% Completed PAGE COPY 100% Completed REDO COPY 100% Completed NOTE: gr-haproxy-mysql-1.gr-haproxy-mysql.kuttl-test-artistic-swift:3306 is shutting down... * Waiting for server restart... \ * Waiting for server restart... | * Waiting for server restart... / * Waiting for server restart... - kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:54:33 +0000 UTC Normal Pod gr-haproxy-mysql-1.spec.containers{mysql} Pulled Successfully pulled image "perconalab/percona-server-mysql-operator:main-psmysql" in 130ms (130ms including waiting) kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:55:05 +0000 UTC Normal PersistentVolumeClaim datadir-gr-haproxy-mysql-2 WaitForFirstConsumer waiting for first consumer to be created before binding persistentvolume-controller logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:55:05 +0000 UTC Normal PersistentVolumeClaim datadir-gr-haproxy-mysql-2 Provisioning External provisioner is provisioning volume for claim "kuttl-test-artistic-swift/datadir-gr-haproxy-mysql-2" pd.csi.storage.gke.io_gke-d0da6129b5eb4610bf17-7f04-aeb9-vm_a4476989-4096-43d3-b8a6-12ceb417008b logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:55:05 +0000 UTC Normal PersistentVolumeClaim datadir-gr-haproxy-mysql-2 ExternalProvisioning Waiting for a volume to be created either by the external provisioner 'pd.csi.storage.gke.io' or manually by the system administrator. If volume creation is delayed, please verify that the provisioner is running and correctly registered. persistentvolume-controller logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:55:05 +0000 UTC Normal StatefulSet.apps gr-haproxy-mysql SuccessfulCreate create Claim datadir-gr-haproxy-mysql-2 Pod gr-haproxy-mysql-2 in StatefulSet gr-haproxy-mysql success statefulset-controller logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:55:05 +0000 UTC Normal StatefulSet.apps gr-haproxy-mysql SuccessfulCreate create Pod gr-haproxy-mysql-2 in StatefulSet gr-haproxy-mysql successful statefulset-controller logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:55:08 +0000 UTC Normal PersistentVolumeClaim datadir-gr-haproxy-mysql-2 ProvisioningSucceeded Successfully provisioned volume pvc-4ce65fd3-854a-413b-8484-fd1a6d5951b2 pd.csi.storage.gke.io_gke-d0da6129b5eb4610bf17-7f04-aeb9-vm_a4476989-4096-43d3-b8a6-12ceb417008b logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:55:09 +0000 UTC Normal Pod gr-haproxy-mysql-2 Scheduled Successfully assigned kuttl-test-artistic-swift/gr-haproxy-mysql-2 to gke-jen-ps-753-8f2a8b69--default-pool-ed4d2ff0-3lk9 default-scheduler logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:55:16 +0000 UTC Normal Pod gr-haproxy-mysql-2 SuccessfulAttachVolume AttachVolume.Attach succeeded for volume "pvc-4ce65fd3-854a-413b-8484-fd1a6d5951b2" attachdetach-controller logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:55:17 +0000 UTC Normal Pod gr-haproxy-mysql-2.spec.initContainers{mysql-init} Pulling Pulling image "perconalab/percona-server-mysql-operator:PR-753-8f2a8b69" kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:55:17 +0000 UTC Normal Pod gr-haproxy-mysql-2.spec.initContainers{mysql-init} Pulled Successfully pulled image "perconalab/percona-server-mysql-operator:PR-753-8f2a8b69" in 127ms (127ms including waiting) kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:55:17 +0000 UTC Normal Pod gr-haproxy-mysql-2.spec.initContainers{mysql-init} Created Created container mysql-init kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:55:17 +0000 UTC Normal Pod gr-haproxy-mysql-2.spec.initContainers{mysql-init} Started Started container mysql-init kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:55:20 +0000 UTC Normal Pod gr-haproxy-mysql-2.spec.containers{mysql} Pulling Pulling image "perconalab/percona-server-mysql-operator:main-psmysql" kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:55:20 +0000 UTC Normal Pod gr-haproxy-mysql-2.spec.containers{mysql} Pulled Successfully pulled image "perconalab/percona-server-mysql-operator:main-psmysql" in 107ms (107ms including waiting) kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:55:20 +0000 UTC Normal Pod gr-haproxy-mysql-2.spec.containers{mysql} Created Created container mysql kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:55:20 +0000 UTC Normal Pod gr-haproxy-mysql-2.spec.containers{mysql} Started Started container mysql kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:55:20 +0000 UTC Normal Pod gr-haproxy-mysql-2.spec.containers{xtrabackup} Pulling Pulling image "perconalab/percona-server-mysql-operator:main-backup" kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:55:20 +0000 UTC Normal Pod gr-haproxy-mysql-2.spec.containers{xtrabackup} Pulled Successfully pulled image "perconalab/percona-server-mysql-operator:main-backup" in 95ms (95ms including waiting) kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:55:20 +0000 UTC Normal Pod gr-haproxy-mysql-2.spec.containers{xtrabackup} Created Created container xtrabackup kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:55:20 +0000 UTC Normal Pod gr-haproxy-mysql-2.spec.containers{xtrabackup} Started Started container xtrabackup kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:55:51 +0000 UTC Warning Pod gr-haproxy-mysql-2.spec.containers{mysql} Unhealthy Startup probe failed: 2024/10/02 01:55:37 Bootstrap starting... 2024/10/02 01:55:37 Running dba.configureLocalInstance('operator:*****@gr-haproxy-mysql-2.gr-haproxy-mysql.kuttl-test-artistic-swift', {'clearReadOnly': true}) WARNING: Using a password on the command line interface can be insecure. WARNING: The clearReadOnly option is deprecated and will be removed in a future release. WARNING: This function is deprecated and will be removed in a future release of MySQL Shell, use dba.configureInstance() instead. Configuring local MySQL instance listening at port 3306 for use in an InnoDB cluster... This instance reports its own address as gr-haproxy-mysql-2.gr-haproxy-mysql.kuttl-test-artistic-swift:3306 applierWorkerThreads will be set to the default value of 4. NOTE: Some configuration options need to be fixed: +----------------------------------------+---------------+----------------+----------------------------+ +----------------------------------------+---------------+----------------+----------------------------+ | Variable | Current Value | Required Value | Note |+----------------------------------------+---------------+----------------+----------------------------+ | binlog_transaction_dependency_tracking | COMMIT_ORDER | WRITESET | Update the server variable |Disabled super_read_only on the instance 'gr-haproxy-mysql-2.gr-haproxy-mysql.kuttl-test-artistic-swift:3306' Enabling super_read_only on the instance 'gr-haproxy-mysql-2.gr-haproxy-mysql.kuttl-test-artistic-swift:3306' Configuring instance... WARNING:*****@binlog_transaction_dependency_tracking' is deprecated and will be removed in a future release. (Code 1287). The instance 'gr-haproxy-mysql-2.gr-haproxy-mysql.kuttl-test-artistic-swift:3306' was configured to be used in an InnoDB cluster. 2024/10/02 01:55:38 Instance (gr-haproxy-mysql-2.gr-haproxy-mysql.kuttl-test-artistic-swift) configured to join to the InnoDB cluster 2024/10/02 01:55:38 peers: [gr-haproxy-mysql-0.gr-haproxy-mysql.kuttl-test-artistic-swift gr-haproxy-mysql-1.gr-haproxy-mysql.kuttl-test-artistic-swift gr-haproxy-mysql-2.gr-haproxy-mysql.kuttl-test-artistic-swift] 2024/10/02 01:55:38 Running dba.getCluster('grhaproxy') WARNING: Using a password on the command line interface can be insecure. 2024/10/02 01:55:38 Connected to peer gr-haproxy-mysql-0.gr-haproxy-mysql.kuttl-test-artistic-swift 2024/10/02 01:55:39 Cluster status: ClusterName: grhaproxy Status: OK_NO_TOLERANCE StatusText: Cluster is NOT tolerant to any failures. SSL: REQUIRED Primary: gr-haproxy-mysql-0.gr-haproxy-mysql.kuttl-test-artistic-swift:3306 Topology: Member 0 Address: gr-haproxy-mysql-0.gr-haproxy-mysql.kuttl-test-artistic-swift:3306 State: ONLINE Errors: [] Member 1 Address: gr-haproxy-mysql-1.gr-haproxy-mysql.kuttl-test-artistic-swift:3306 State: ONLINE Errors: [] 2024/10/02 01:55:39 Adding instance (gr-haproxy-mysql-2.gr-haproxy-mysql.kuttl-test-artistic-swift) to InnoDB cluster 2024/10/02 01:55:39 Running dba.getCluster('grhaproxy').addInstance('operator:*****@gr-haproxy-mysql-2.gr-haproxy-mysql.kuttl-test-artistic-swift', {'recoveryMethod': 'clone', 'waitRecovery': 3}) WARNING: Using a password on the command line interface can be insecure. WARNING: The waitRecovery option is deprecated. Please use the recoveryProgress option instead. NOTE: The target instance 'gr-haproxy-mysql-2.gr-haproxy-mysql.kuttl-test-artistic-swift:3306' has not been pre-provisioned (GTID set is empty). The Shell is unable to decide whether incremental state recovery can correctly provision it. Clone based recovery selected through the recoveryMethod option Validating instance configuration at gr-haproxy-mysql-2.gr-haproxy-mysql.kuttl-test-artistic-swift:3306... This instance reports its own address as gr-haproxy-mysql-2.gr-haproxy-mysql.kuttl-test-artistic-swift:3306 Instance configuration is suitable. NOTE: Group Replication will communicate with other members using 'gr-haproxy-mysql-2.gr-haproxy-mysql.kuttl-test-artistic-swift:3306'. Use the localAddress option to override. * Checking connectivity and SSL configuration... A new instance will be added to the InnoDB Cluster. Depending on the amount of data on the cluster this might take from a few seconds to several hours. Adding instance to the cluster... Monitoring recovery process of the new cluster member. Press ^C to stop monitoring and let it continue in background. Clone based state recovery is now in progress. NOTE: A server restart is expected to happen as part of the clone process. If the server does not support the RESTART command or does not come back after a while, you may need to manually start it back. * Waiting for clone to finish... NOTE: gr-haproxy-mysql-2.gr-haproxy-mysql.kuttl-test-artistic-swift:3306 is being cloned from gr-haproxy-mysql-1.gr-haproxy-mysql.kuttl-test-artistic-swift:3306 ** Stage DROP DATA: Completed ** Clone Transfer FILE COPY 0% In Progress PAGE COPY 0% Not Started REDO COPY 0% Not Started** Clone Transfer FILE COPY 100% Completed PAGE COPY 100% Completed REDO COPY 100% Completed NOTE: gr-haproxy-mysql-2.gr-haproxy-mysql.kuttl-test-artistic-swift:3306 is shutting down... * Waiting for server restart... \ * Waiting for server restart... | * Waiting for server restart... / * Waiting for server restart... - kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:55:51 +0000 UTC Normal Pod gr-haproxy-mysql-2.spec.containers{mysql} Killing Container mysql failed startup probe, will be restarted kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:55:51 +0000 UTC Warning Pod gr-haproxy-mysql-2.spec.containers{mysql} FailedPreStopHook PreStopHook failed kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:55:51 +0000 UTC Normal Pod gr-haproxy-mysql-2.spec.containers{mysql} Pulled Successfully pulled image "perconalab/percona-server-mysql-operator:main-psmysql" in 136ms (136ms including waiting) kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:57:00 +0000 UTC Normal Pod gr-haproxy-mysql-0.spec.containers{mysql} Killing Stopping container mysql kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:57:00 +0000 UTC Normal Pod gr-haproxy-mysql-2.spec.containers{xtrabackup} Killing Stopping container xtrabackup kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:57:01 +0000 UTC Normal Pod gr-haproxy-haproxy-0.spec.containers{haproxy} Killing Stopping container haproxy kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:57:01 +0000 UTC Normal Pod gr-haproxy-haproxy-0.spec.containers{mysql-monit} Killing Stopping container mysql-monit kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:57:01 +0000 UTC Normal Pod gr-haproxy-haproxy-1.spec.containers{haproxy} Killing Stopping container haproxy kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:57:01 +0000 UTC Normal Pod gr-haproxy-haproxy-1.spec.containers{mysql-monit} Killing Stopping container mysql-monit kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:57:01 +0000 UTC Normal Pod gr-haproxy-haproxy-2.spec.containers{mysql-monit} Killing Stopping container mysql-monit kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:57:01 +0000 UTC Normal Pod gr-haproxy-haproxy-2.spec.containers{haproxy} Killing Stopping container haproxy kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:57:01 +0000 UTC Normal Pod gr-haproxy-mysql-0.spec.containers{xtrabackup} Killing Stopping container xtrabackup kubelet logger.go:42: 01:57:08 | gr-haproxy | 2024-10-02 01:57:01 +0000 UTC Normal Pod gr-haproxy-mysql-2.spec.containers{mysql} Killing Stopping container mysql kubelet logger.go:42: 01:57:08 | gr-haproxy | Deleting namespace: kuttl-test-artistic-swift === NAME kuttl harness.go:407: run tests finished harness.go:515: cleaning up harness.go:572: removing temp folder: "" --- PASS: kuttl (405.26s) --- PASS: kuttl/harness (0.00s) --- PASS: kuttl/harness/gr-haproxy (404.83s) PASS