++ echo 'Log: /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/logs/demand-backup-sharded.log' Log: /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/logs/demand-backup-sharded.log ++ '[' -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/conf/cloud-secret.yml ']' ++ SKIP_BACKUPS_TO_AWS_GCP_AZURE= ++ oc get projects ++ kubectl get nodes ++ grep '^minikube' +++ kubectl version -o json +++ jq -r .serverVersion.gitVersion +++ grep '\-eks\-' WARNING: version difference between client (1.30) and server (1.26) exceeds the supported minor version skew of +/-1 ++ '[' ']' ++ EKS=0 +++ kubectl version -o json +++ grep gke +++ jq -r .serverVersion.gitVersion WARNING: version difference between client (1.30) and server (1.26) exceeds the supported minor version skew of +/-1 ++ '[' v1.26.15-gke.1381000 ']' ++ GKE=1 +++ kubectl version -o json +++ jq -r '.serverVersion.major + "." + .serverVersion.minor' +++ /usr/bin/sed -r 's/[^0-9.]+//g' WARNING: version difference between client (1.30) and server (1.26) exceeds the supported minor version skew of +/-1 ++ KUBE_VERSION=1.26 + set_debug + [[ 1 == 1 ]] + set -o xtrace + create_infra demand-backup-sharded-19473 + local ns=demand-backup-sharded-19473 + delete_crd + desc 'get and delete old CRDs and RBAC' + set +o xtrace ----------------------------------------------------------------------------------- get and delete old CRDs and RBAC ----------------------------------------------------------------------------------- + kubectl_bin delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/deploy/crd.yaml --ignore-not-found --wait=false ++ mktemp + local LAST_OUT=/tmp/tmp.VjGfJGUfyw ++ mktemp + local LAST_ERR=/tmp/tmp.OTHliO8V0D + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/deploy/crd.yaml --ignore-not-found --wait=false + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.VjGfJGUfyw customresourcedefinition.apiextensions.k8s.io "perconaservermongodbbackups.psmdb.percona.com" deleted customresourcedefinition.apiextensions.k8s.io "perconaservermongodbrestores.psmdb.percona.com" deleted customresourcedefinition.apiextensions.k8s.io "perconaservermongodbs.psmdb.percona.com" deleted + cat /tmp/tmp.OTHliO8V0D + rm /tmp/tmp.VjGfJGUfyw /tmp/tmp.OTHliO8V0D + return 0 ++ yq eval .metadata.name /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/deploy/crd.yaml ++ grep -v '\-\-\-' + for crd_name in '$(yq eval '\''.metadata.name'\'' "${src_dir}/deploy/crd.yaml" | grep -v '\''\-\-\-'\'')' + kubectl get perconaservermongodbbackups.psmdb.percona.com --all-namespaces -o wide + grep -v NAMESPACE + xargs -L 1 sh -xc 'kubectl patch perconaservermongodbbackups.psmdb.percona.com -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' No resources found + kubectl patch perconaservermongodbbackups.psmdb.percona.com -n sh --type=merge -p '{"metadata":{"finalizers":[]}}' error: resource(s) were provided, but no name was specified + : + kubectl_bin wait --for=delete crd perconaservermongodbbackups.psmdb.percona.com ++ mktemp + local LAST_OUT=/tmp/tmp.Gi9ZWGiie4 ++ mktemp + local LAST_ERR=/tmp/tmp.DnGzsg1iYG + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=delete crd perconaservermongodbbackups.psmdb.percona.com + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.Gi9ZWGiie4 customresourcedefinition.apiextensions.k8s.io/perconaservermongodbbackups.psmdb.percona.com condition met + cat /tmp/tmp.DnGzsg1iYG + rm /tmp/tmp.Gi9ZWGiie4 /tmp/tmp.DnGzsg1iYG + return 0 + for crd_name in '$(yq eval '\''.metadata.name'\'' "${src_dir}/deploy/crd.yaml" | grep -v '\''\-\-\-'\'')' + kubectl get perconaservermongodbrestores.psmdb.percona.com --all-namespaces -o wide + grep -v NAMESPACE + xargs -L 1 sh -xc 'kubectl patch perconaservermongodbrestores.psmdb.percona.com -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' error: the server doesn't have a resource type "perconaservermongodbrestores" + kubectl patch perconaservermongodbrestores.psmdb.percona.com -n sh --type=merge -p '{"metadata":{"finalizers":[]}}' error: the server doesn't have a resource type "perconaservermongodbrestores" + : + kubectl_bin wait --for=delete crd perconaservermongodbrestores.psmdb.percona.com ++ mktemp + local LAST_OUT=/tmp/tmp.rLiZ7mftYo ++ mktemp + local LAST_ERR=/tmp/tmp.WHvHb0DnXK + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=delete crd perconaservermongodbrestores.psmdb.percona.com + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.rLiZ7mftYo + cat /tmp/tmp.WHvHb0DnXK + rm /tmp/tmp.rLiZ7mftYo /tmp/tmp.WHvHb0DnXK + return 0 + for crd_name in '$(yq eval '\''.metadata.name'\'' "${src_dir}/deploy/crd.yaml" | grep -v '\''\-\-\-'\'')' + kubectl get perconaservermongodbs.psmdb.percona.com --all-namespaces -o wide + grep -v NAMESPACE + xargs -L 1 sh -xc 'kubectl patch perconaservermongodbs.psmdb.percona.com -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' error: the server doesn't have a resource type "perconaservermongodbs" + kubectl patch perconaservermongodbs.psmdb.percona.com -n sh --type=merge -p '{"metadata":{"finalizers":[]}}' error: the server doesn't have a resource type "perconaservermongodbs" + : + kubectl_bin wait --for=delete crd perconaservermongodbs.psmdb.percona.com ++ mktemp + local LAST_OUT=/tmp/tmp.BSEEPTnfGQ ++ mktemp + local LAST_ERR=/tmp/tmp.ufsIjfB3gG + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=delete crd perconaservermongodbs.psmdb.percona.com + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.BSEEPTnfGQ + cat /tmp/tmp.ufsIjfB3gG + rm /tmp/tmp.BSEEPTnfGQ /tmp/tmp.ufsIjfB3gG + return 0 + local rbac_yaml=rbac.yaml + '[' -n psmdb-operator ']' + rbac_yaml=cw-rbac.yaml + kubectl_bin delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/deploy/cw-rbac.yaml --ignore-not-found ++ mktemp + local LAST_OUT=/tmp/tmp.7ABq2B39Fb ++ mktemp + local LAST_ERR=/tmp/tmp.pGpxbSvWBS + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/deploy/cw-rbac.yaml --ignore-not-found + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.7ABq2B39Fb clusterrole.rbac.authorization.k8s.io "percona-server-mongodb-operator" deleted clusterrolebinding.rbac.authorization.k8s.io "service-account-percona-server-mongodb-operator" deleted + cat /tmp/tmp.pGpxbSvWBS + rm /tmp/tmp.7ABq2B39Fb /tmp/tmp.pGpxbSvWBS + return 0 + check_crd_for_deletion PR-1551-e268aa9a + local git_tag=PR-1551-e268aa9a ++ curl -s https://raw.githubusercontent.com/percona/percona-server-mongodb-operator/PR-1551-e268aa9a/deploy/crd.yaml ++ yq eval .metadata.name ++ /usr/bin/sed s/---//g ++ /usr/bin/sed ':a;N;$!ba;s/\n/ /g' + for crd_name in '$(curl -s https://raw.githubusercontent.com/percona/percona-server-mongodb-operator/${git_tag}/deploy/crd.yaml | yq eval '\''.metadata.name'\'' | $sed '\''s/---//g'\'' | $sed '\'':a;N;$!ba;s/\n/ /g'\'')' ++ kubectl_bin get crd/null -o 'jsonpath={.status.conditions[-1].type}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ZCesC5sXjh +++ mktemp ++ local LAST_ERR=/tmp/tmp.GF9DBzPgzR ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get crd/null -o 'jsonpath={.status.conditions[-1].type}' ++ exit_status=1 ++ set -e ++ '[' 1 '!=' 0 -a -n 1 ']' ++ cat /tmp/tmp.ZCesC5sXjh ++ cat /tmp/tmp.GF9DBzPgzR Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "null" not found ++ sleep 0 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get crd/null -o 'jsonpath={.status.conditions[-1].type}' ++ exit_status=1 ++ set -e ++ '[' 1 '!=' 0 -a -n 1 ']' ++ cat /tmp/tmp.ZCesC5sXjh ++ cat /tmp/tmp.GF9DBzPgzR Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "null" not found ++ sleep 4 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get crd/null -o 'jsonpath={.status.conditions[-1].type}' ++ exit_status=1 ++ set -e ++ '[' 1 '!=' 0 -a -n 1 ']' ++ cat /tmp/tmp.ZCesC5sXjh ++ cat /tmp/tmp.GF9DBzPgzR Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "null" not found ++ sleep 8 ++ cat /tmp/tmp.ZCesC5sXjh ++ cat /tmp/tmp.GF9DBzPgzR Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "null" not found ++ rm /tmp/tmp.ZCesC5sXjh /tmp/tmp.GF9DBzPgzR ++ return 1 + [[ '' == \T\e\r\m\i\n\a\t\i\n\g ]] + '[' -n psmdb-operator ']' + create_namespace psmdb-operator + local namespace=psmdb-operator + local skip_clean_namespace= + [[ 1 == 1 ]] + [[ -z '' ]] + destroy_chaos_mesh ++ helm list --all-namespaces --filter chaos-mesh ++ tail -n1 ++ awk '-F ' '{print $2}' ++ sed s/NAMESPACE// + local chaos_mesh_ns= + desc 'destroy chaos-mesh' + set +o xtrace ----------------------------------------------------------------------------------- destroy chaos-mesh ----------------------------------------------------------------------------------- + '[' -n '' ']' ++ kubectl get MutatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete MutatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep validate-auth ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl api-resources ++ grep chaos-mesh ++ awk '{print $1}' ++ kubectl get crd ++ grep chaos-mesh.org ++ awk '{print $1}' + timeout 30 kubectl delete crd error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrolebinding ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrolebinding error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrole ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrole error: resource(s) were provided, but no name was specified + : + desc 'cleaned up all old namespaces' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up all old namespaces ----------------------------------------------------------------------------------- + kubectl_bin get ns + egrep -v '^kube-|^default|Terminating|psmdb-operator|openshift|gke-mcs|^NAME' + awk '{print$1}' + '[' -n '' ']' + desc 'cleaned up old namespaces psmdb-operator' + xargs kubectl delete ns + set +o xtrace ----------------------------------------------------------------------------------- cleaned up old namespaces psmdb-operator ----------------------------------------------------------------------------------- + kubectl_bin delete namespace psmdb-operator --ignore-not-found ++ mktemp ++ mktemp + local LAST_OUT=/tmp/tmp.tovqqaGeJJ ++ mktemp + local LAST_OUT=/tmp/tmp.XYLzFug5zw ++ mktemp + local LAST_ERR=/tmp/tmp.YeHD6l1JEQ + local exit_status=0 + local timeout=4 ++ seq 0 2 + local LAST_ERR=/tmp/tmp.qC577vqTg0 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get ns + for i in '$(seq 0 2)' + set +e + kubectl delete namespace psmdb-operator --ignore-not-found + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.tovqqaGeJJ + cat /tmp/tmp.YeHD6l1JEQ + rm /tmp/tmp.tovqqaGeJJ /tmp/tmp.YeHD6l1JEQ + return 0 namespace "demand-backup-sharded-32718" deleted + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.XYLzFug5zw namespace "psmdb-operator" deleted + cat /tmp/tmp.qC577vqTg0 + rm /tmp/tmp.XYLzFug5zw /tmp/tmp.qC577vqTg0 + return 0 + kubectl_bin wait --for=delete namespace psmdb-operator ++ mktemp + local LAST_OUT=/tmp/tmp.jCFY35Loe8 ++ mktemp + local LAST_ERR=/tmp/tmp.uRhZRdJifY + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=delete namespace psmdb-operator + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.jCFY35Loe8 + cat /tmp/tmp.uRhZRdJifY + rm /tmp/tmp.jCFY35Loe8 /tmp/tmp.uRhZRdJifY + return 0 + desc 'create namespace psmdb-operator' + set +o xtrace ----------------------------------------------------------------------------------- create namespace psmdb-operator ----------------------------------------------------------------------------------- + kubectl_bin create namespace psmdb-operator ++ mktemp + local LAST_OUT=/tmp/tmp.7mXJSOwmxO ++ mktemp + local LAST_ERR=/tmp/tmp.2z1N4qIWEi + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl create namespace psmdb-operator + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.7mXJSOwmxO namespace/psmdb-operator created + cat /tmp/tmp.2z1N4qIWEi + rm /tmp/tmp.7mXJSOwmxO /tmp/tmp.2z1N4qIWEi + return 0 ++ kubectl_bin config current-context +++ mktemp ++ local LAST_OUT=/tmp/tmp.UCRZmu1Vmo +++ mktemp ++ local LAST_ERR=/tmp/tmp.GPrdSHsdK3 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl config current-context ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.UCRZmu1Vmo ++ cat /tmp/tmp.GPrdSHsdK3 ++ rm /tmp/tmp.UCRZmu1Vmo /tmp/tmp.GPrdSHsdK3 ++ return 0 + kubectl_bin config set-context gke_cloud-dev-112233_us-central1-a_jen-psmdb-1551-e268aa9a-2-cluster1 --namespace=psmdb-operator ++ mktemp + local LAST_OUT=/tmp/tmp.uzNrknZswN ++ mktemp + local LAST_ERR=/tmp/tmp.ZpikXc4VjQ + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl config set-context gke_cloud-dev-112233_us-central1-a_jen-psmdb-1551-e268aa9a-2-cluster1 --namespace=psmdb-operator + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.uzNrknZswN Context "gke_cloud-dev-112233_us-central1-a_jen-psmdb-1551-e268aa9a-2-cluster1" modified. + cat /tmp/tmp.ZpikXc4VjQ + rm /tmp/tmp.uzNrknZswN /tmp/tmp.ZpikXc4VjQ + return 0 + deploy_operator + desc 'start PSMDB operator' + set +o xtrace ----------------------------------------------------------------------------------- start PSMDB operator ----------------------------------------------------------------------------------- + local cr_file + '[' -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/conf/crd.yaml ']' + cr_file=/mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/deploy/crd.yaml + kubectl_bin apply --server-side --force-conflicts -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/deploy/crd.yaml ++ mktemp + local LAST_OUT=/tmp/tmp.mGj1x3VnOH ++ mktemp + local LAST_ERR=/tmp/tmp.5iRbewadzy + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply --server-side --force-conflicts -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/deploy/crd.yaml + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.mGj1x3VnOH customresourcedefinition.apiextensions.k8s.io/perconaservermongodbbackups.psmdb.percona.com serverside-applied customresourcedefinition.apiextensions.k8s.io/perconaservermongodbrestores.psmdb.percona.com serverside-applied customresourcedefinition.apiextensions.k8s.io/perconaservermongodbs.psmdb.percona.com serverside-applied + cat /tmp/tmp.5iRbewadzy + rm /tmp/tmp.mGj1x3VnOH /tmp/tmp.5iRbewadzy + return 0 + '[' -n psmdb-operator ']' + apply_rbac cw-rbac + local operator_namespace=psmdb-operator + local rbac=cw-rbac + cat /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/deploy/cw-rbac.yaml + kubectl_bin apply -n psmdb-operator -f - + sed -e 's^namespace: .*^namespace: psmdb-operator^' ++ mktemp + local LAST_OUT=/tmp/tmp.THcHRhaZKq ++ mktemp + local LAST_ERR=/tmp/tmp.fODUSeOTKA + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -n psmdb-operator -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.THcHRhaZKq clusterrole.rbac.authorization.k8s.io/percona-server-mongodb-operator created serviceaccount/percona-server-mongodb-operator created clusterrolebinding.rbac.authorization.k8s.io/service-account-percona-server-mongodb-operator created + cat /tmp/tmp.fODUSeOTKA + rm /tmp/tmp.THcHRhaZKq /tmp/tmp.fODUSeOTKA + return 0 + yq eval ' (.spec.template.spec.containers[].image = "perconalab/percona-server-mongodb-operator:PR-1551-e268aa9a") | ((.. | select(.[] == "DISABLE_TELEMETRY")) |= .value="true") | ((.. | select(.[] == "LOG_LEVEL")) |= .value="DEBUG")' /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/deploy/cw-operator.yaml + kubectl_bin apply -f - ++ mktemp + local LAST_OUT=/tmp/tmp.xLTvqN425u ++ mktemp + local LAST_ERR=/tmp/tmp.j0zYQdBI8U + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.xLTvqN425u deployment.apps/percona-server-mongodb-operator created + cat /tmp/tmp.j0zYQdBI8U + rm /tmp/tmp.xLTvqN425u /tmp/tmp.j0zYQdBI8U + return 0 + sleep 2 ++ get_operator_pod ++ kubectl_bin get pods --selector=name=percona-server-mongodb-operator -o 'jsonpath={.items[].metadata.name}' -n psmdb-operator +++ mktemp ++ local LAST_OUT=/tmp/tmp.ph18ncAeOo +++ mktemp ++ local LAST_ERR=/tmp/tmp.LcK8C4G4jN ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=percona-server-mongodb-operator -o 'jsonpath={.items[].metadata.name}' -n psmdb-operator ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.ph18ncAeOo ++ cat /tmp/tmp.LcK8C4G4jN ++ rm /tmp/tmp.ph18ncAeOo /tmp/tmp.LcK8C4G4jN ++ return 0 + wait_pod percona-server-mongodb-operator-56586457c4-97zlt + local pod=percona-server-mongodb-operator-56586457c4-97zlt + set +o xtrace waiting for pod/percona-server-mongodb-operator-56586457c4-97zlt to be ready.OK + create_namespace demand-backup-sharded-19473 + local namespace=demand-backup-sharded-19473 + local skip_clean_namespace= + [[ 1 == 1 ]] + [[ -z '' ]] + destroy_chaos_mesh ++ helm list --all-namespaces --filter chaos-mesh ++ tail -n1 ++ awk '-F ' '{print $2}' ++ sed s/NAMESPACE// + local chaos_mesh_ns= + desc 'destroy chaos-mesh' + set +o xtrace ----------------------------------------------------------------------------------- destroy chaos-mesh ----------------------------------------------------------------------------------- + '[' -n '' ']' ++ kubectl get MutatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete MutatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep validate-auth ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl api-resources ++ awk '{print $1}' ++ grep chaos-mesh ++ kubectl get crd ++ grep chaos-mesh.org ++ awk '{print $1}' + timeout 30 kubectl delete crd error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrolebinding ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrolebinding error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrole ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrole error: resource(s) were provided, but no name was specified + : + desc 'cleaned up all old namespaces' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up all old namespaces ----------------------------------------------------------------------------------- + kubectl_bin get ns + awk '{print$1}' + '[' -n '' ']' + desc 'cleaned up old namespaces demand-backup-sharded-19473' + xargs kubectl delete ns + set +o xtrace ----------------------------------------------------------------------------------- cleaned up old namespaces demand-backup-sharded-19473 ----------------------------------------------------------------------------------- + kubectl_bin delete namespace demand-backup-sharded-19473 --ignore-not-found ++ mktemp ++ mktemp + egrep -v '^kube-|^default|Terminating|psmdb-operator|openshift|gke-mcs|^NAME' + local LAST_OUT=/tmp/tmp.ky0A8Le0G8 ++ mktemp + local LAST_OUT=/tmp/tmp.BC9GsWw9nz ++ mktemp + local LAST_ERR=/tmp/tmp.MCBAMqLSvx + local exit_status=0 + local timeout=4 + local LAST_ERR=/tmp/tmp.dSZRI7H4aA + local exit_status=0 + local timeout=4 ++ seq 0 2 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete namespace demand-backup-sharded-19473 --ignore-not-found + for i in '$(seq 0 2)' + set +e + kubectl get ns + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.BC9GsWw9nz + cat /tmp/tmp.MCBAMqLSvx + rm /tmp/tmp.BC9GsWw9nz /tmp/tmp.MCBAMqLSvx + return 0 error: resource(s) were provided, but no name was specified + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.ky0A8Le0G8 + cat /tmp/tmp.dSZRI7H4aA + rm /tmp/tmp.ky0A8Le0G8 /tmp/tmp.dSZRI7H4aA + return 0 + kubectl_bin wait --for=delete namespace demand-backup-sharded-19473 ++ mktemp + local LAST_OUT=/tmp/tmp.cosqzRXo5K ++ mktemp + local LAST_ERR=/tmp/tmp.esBZaoThBJ + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=delete namespace demand-backup-sharded-19473 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.cosqzRXo5K + cat /tmp/tmp.esBZaoThBJ + rm /tmp/tmp.cosqzRXo5K /tmp/tmp.esBZaoThBJ + return 0 + desc 'create namespace demand-backup-sharded-19473' + set +o xtrace ----------------------------------------------------------------------------------- create namespace demand-backup-sharded-19473 ----------------------------------------------------------------------------------- + kubectl_bin create namespace demand-backup-sharded-19473 ++ mktemp + local LAST_OUT=/tmp/tmp.mXzv7wwKKI ++ mktemp + local LAST_ERR=/tmp/tmp.EXxYQRZS8H + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl create namespace demand-backup-sharded-19473 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.mXzv7wwKKI namespace/demand-backup-sharded-19473 created + cat /tmp/tmp.EXxYQRZS8H + rm /tmp/tmp.mXzv7wwKKI /tmp/tmp.EXxYQRZS8H + return 0 ++ kubectl_bin config current-context +++ mktemp ++ local LAST_OUT=/tmp/tmp.bleyJkdc31 +++ mktemp ++ local LAST_ERR=/tmp/tmp.6XJcr4hh3Z ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl config current-context ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.bleyJkdc31 ++ cat /tmp/tmp.6XJcr4hh3Z ++ rm /tmp/tmp.bleyJkdc31 /tmp/tmp.6XJcr4hh3Z ++ return 0 + kubectl_bin config set-context gke_cloud-dev-112233_us-central1-a_jen-psmdb-1551-e268aa9a-2-cluster1 --namespace=demand-backup-sharded-19473 ++ mktemp + local LAST_OUT=/tmp/tmp.5dlwQyY19H ++ mktemp + local LAST_ERR=/tmp/tmp.8UDEsEdlEg + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl config set-context gke_cloud-dev-112233_us-central1-a_jen-psmdb-1551-e268aa9a-2-cluster1 --namespace=demand-backup-sharded-19473 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.5dlwQyY19H Context "gke_cloud-dev-112233_us-central1-a_jen-psmdb-1551-e268aa9a-2-cluster1" modified. + cat /tmp/tmp.8UDEsEdlEg + rm /tmp/tmp.5dlwQyY19H /tmp/tmp.8UDEsEdlEg + return 0 + deploy_minio + desc 'install Minio' + set +o xtrace ----------------------------------------------------------------------------------- install Minio ----------------------------------------------------------------------------------- + helm uninstall minio-service Error: uninstall: Release not loaded: minio-service: release: not found + : + helm repo remove minio "minio" has been removed from your repositories + helm repo add minio https://charts.min.io/ "minio" has been added to your repositories + retry 10 60 helm install minio-service --version 5.0.14 --set replicas=1 --set mode=standalone --set resources.requests.memory=256Mi --set rootUser=rootuser --set rootPassword=rootpass123 --set 'users[0].accessKey=some-access-key' --set 'users[0].secretKey=some-secret-key' --set 'users[0].policy=consoleAdmin' --set service.type=ClusterIP --set configPathmc=/tmp/.minio/ --set persistence.size=2G --set securityContext.enabled=false minio/minio + local max=10 + local delay=60 + shift 2 + local n=1 + helm install minio-service --version 5.0.14 --set replicas=1 --set mode=standalone --set resources.requests.memory=256Mi --set rootUser=rootuser --set rootPassword=rootpass123 --set 'users[0].accessKey=some-access-key' --set 'users[0].secretKey=some-secret-key' --set 'users[0].policy=consoleAdmin' --set service.type=ClusterIP --set configPathmc=/tmp/.minio/ --set persistence.size=2G --set securityContext.enabled=false minio/minio NAME: minio-service LAST DEPLOYED: Tue Jun 4 15:02:12 2024 NAMESPACE: demand-backup-sharded-19473 STATUS: deployed REVISION: 1 TEST SUITE: None NOTES: MinIO can be accessed via port 9000 on the following DNS name from within your cluster: minio-service.demand-backup-sharded-19473.svc.cluster.local To access MinIO from localhost, run the below commands: 1. export POD_NAME=$(kubectl get pods --namespace demand-backup-sharded-19473 -l "release=minio-service" -o jsonpath="{.items[0].metadata.name}") 2. kubectl port-forward $POD_NAME 9000 --namespace demand-backup-sharded-19473 Read more about port forwarding here: http://kubernetes.io/docs/user-guide/kubectl/kubectl_port-forward/ You can now access MinIO server on http://localhost:9000. Follow the below steps to connect to MinIO server with mc client: 1. Download the MinIO mc client - https://min.io/docs/minio/linux/reference/minio-mc.html#quickstart 2. export MC_HOST_minio-service-local=http://$(kubectl get secret --namespace demand-backup-sharded-19473 minio-service -o jsonpath="{.data.rootUser}" | base64 --decode):$(kubectl get secret --namespace demand-backup-sharded-19473 minio-service -o jsonpath="{.data.rootPassword}" | base64 --decode)@localhost:9000 3. mc ls minio-service-local ++ kubectl_bin get pods --selector=release=minio-service -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.cA8c8TyKAQ +++ mktemp ++ local LAST_ERR=/tmp/tmp.7jwPu1GUKE ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=release=minio-service -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.cA8c8TyKAQ ++ cat /tmp/tmp.7jwPu1GUKE ++ rm /tmp/tmp.cA8c8TyKAQ /tmp/tmp.7jwPu1GUKE ++ return 0 + MINIO_POD=minio-service-57dd49b-hzbll + wait_pod minio-service-57dd49b-hzbll + local pod=minio-service-57dd49b-hzbll + set +o xtrace waiting for pod/minio-service-57dd49b-hzbll to be ready.OK + '[' -n psmdb-operator ']' + kubectl_bin create svc -n psmdb-operator externalname minio-service --external-name=minio-service.demand-backup-sharded-19473.svc.cluster.local --tcp=9000 ++ mktemp + local LAST_OUT=/tmp/tmp.1L8KmLS7EA ++ mktemp + local LAST_ERR=/tmp/tmp.acYhkokbB8 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl create svc -n psmdb-operator externalname minio-service --external-name=minio-service.demand-backup-sharded-19473.svc.cluster.local --tcp=9000 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.1L8KmLS7EA service/minio-service created + cat /tmp/tmp.acYhkokbB8 + rm /tmp/tmp.1L8KmLS7EA /tmp/tmp.acYhkokbB8 + return 0 + kubectl_bin run -i --rm aws-cli --image=perconalab/awscli --restart=Never -- bash -c 'AWS_ACCESS_KEY_ID=some-access-key AWS_SECRET_ACCESS_KEY=some-secret-key AWS_DEFAULT_REGION=us-east-1 \ /usr/bin/aws --endpoint-url http://minio-service:9000 s3 mb s3://operator-testing' ++ mktemp + local LAST_OUT=/tmp/tmp.2TjBkhEjRp ++ mktemp + local LAST_ERR=/tmp/tmp.eHRT6KCrBd + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl run -i --rm aws-cli --image=perconalab/awscli --restart=Never -- bash -c 'AWS_ACCESS_KEY_ID=some-access-key AWS_SECRET_ACCESS_KEY=some-secret-key AWS_DEFAULT_REGION=us-east-1 \ /usr/bin/aws --endpoint-url http://minio-service:9000 s3 mb s3://operator-testing' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.2TjBkhEjRp make_bucket: operator-testing pod "aws-cli" deleted + cat /tmp/tmp.eHRT6KCrBd + rm /tmp/tmp.2TjBkhEjRp /tmp/tmp.eHRT6KCrBd + return 0 + desc 'create first PSMDB cluster' + set +o xtrace ----------------------------------------------------------------------------------- create first PSMDB cluster ----------------------------------------------------------------------------------- + cluster=some-name + kubectl_bin apply -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/conf/secrets.yml -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/conf/client.yml ++ mktemp + local LAST_OUT=/tmp/tmp.c5kTwlZ612 ++ mktemp + local LAST_ERR=/tmp/tmp.ydYRcknL7E + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/conf/secrets.yml -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/conf/client.yml + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.c5kTwlZ612 secret/some-users created deployment.apps/psmdb-client created + cat /tmp/tmp.ydYRcknL7E + rm /tmp/tmp.c5kTwlZ612 /tmp/tmp.ydYRcknL7E + return 0 + apply_s3_storage_secrets + desc 'create secrets for cloud storages' + set +o xtrace ----------------------------------------------------------------------------------- create secrets for cloud storages ----------------------------------------------------------------------------------- + '[' -z '' ']' + kubectl_bin apply -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/conf/minio-secret.yml -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/conf/cloud-secret.yml ++ mktemp + local LAST_OUT=/tmp/tmp.vadCK00Arb ++ mktemp + local LAST_ERR=/tmp/tmp.RwcMwMMr5A + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/conf/minio-secret.yml -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/conf/cloud-secret.yml + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.vadCK00Arb secret/minio-secret created secret/aws-s3-secret created secret/gcp-cs-secret created secret/azure-secret created + cat /tmp/tmp.RwcMwMMr5A + rm /tmp/tmp.vadCK00Arb /tmp/tmp.RwcMwMMr5A + return 0 + version_gt 1.19 ++ echo '1.26 >= 1.19' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' 0 -ne 1 ']' + cat /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/conf/container-rc.yaml + kubectl_bin apply -f - + /usr/bin/sed s/docker/runc/g ++ mktemp + local LAST_OUT=/tmp/tmp.SnVpcNfaZz ++ mktemp + local LAST_ERR=/tmp/tmp.s2uDyGL02E + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.SnVpcNfaZz runtimeclass.node.k8s.io/container-rc unchanged + cat /tmp/tmp.s2uDyGL02E + rm /tmp/tmp.SnVpcNfaZz /tmp/tmp.s2uDyGL02E + return 0 + apply_cluster /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/conf/some-name-rs0.yml + '[' -z '' ']' + cat_config /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/conf/some-name-rs0.yml + kubectl_bin apply -f - + cat /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/conf/some-name-rs0.yml + yq eval '(.spec | select(.image == null)).image = "perconalab/percona-server-mongodb-operator:main-mongod7.0"' + yq eval '(.spec | select(has("pmm"))).pmm.image = "perconalab/pmm-client:dev-latest"' + yq eval '(.spec | select(has("initImage"))).initImage = "perconalab/percona-server-mongodb-operator:PR-1551-e268aa9a"' + yq eval '(.spec | select(has("backup"))).backup.image = "perconalab/percona-server-mongodb-operator:main-backup"' + yq eval '.spec.upgradeOptions.apply="Never"' ++ mktemp + local LAST_OUT=/tmp/tmp.lgYh404xrw ++ mktemp + local LAST_ERR=/tmp/tmp.Uhf70c9TtB + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.lgYh404xrw perconaservermongodb.psmdb.percona.com/some-name created + cat /tmp/tmp.Uhf70c9TtB + rm /tmp/tmp.lgYh404xrw /tmp/tmp.Uhf70c9TtB + return 0 + desc 'check if all 3 Pods started' + set +o xtrace ----------------------------------------------------------------------------------- check if all 3 Pods started ----------------------------------------------------------------------------------- + wait_for_running some-name-rs0 3 + local name=some-name-rs0 + let last_pod=2 + local check_cluster_readyness=true + set_debug + [[ 1 == 1 ]] + set -o xtrace + local rs_name=rs0 + local cluster_name=some-name ++ seq 0 2 + for i in '$(seq 0 $last_pod)' + [[ 0 -eq 2 ]] + wait_pod some-name-rs0-0 + local pod=some-name-rs0-0 + set +o xtrace waiting for pod/some-name-rs0-0 to be ready........OK + for i in '$(seq 0 $last_pod)' + [[ 1 -eq 2 ]] + wait_pod some-name-rs0-1 + local pod=some-name-rs0-1 + set +o xtrace waiting for pod/some-name-rs0-1 to be ready......OK + for i in '$(seq 0 $last_pod)' + [[ 2 -eq 2 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="rs0")].arbiter.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.uvZYZUxiOG +++ mktemp ++ local LAST_ERR=/tmp/tmp.ZJcWYZsFzK ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="rs0")].arbiter.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.uvZYZUxiOG ++ cat /tmp/tmp.ZJcWYZsFzK ++ rm /tmp/tmp.uvZYZUxiOG /tmp/tmp.ZJcWYZsFzK ++ return 0 + [[ '' == \t\r\u\e ]] + wait_pod some-name-rs0-2 + local pod=some-name-rs0-2 + set +o xtrace waiting for pod/some-name-rs0-2 to be ready......OK ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="rs0")].non_voting.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.mmugbg1nPq +++ mktemp ++ local LAST_ERR=/tmp/tmp.Ex6fNv7oXn ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="rs0")].non_voting.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.mmugbg1nPq ++ cat /tmp/tmp.Ex6fNv7oXn ++ rm /tmp/tmp.mmugbg1nPq /tmp/tmp.Ex6fNv7oXn ++ return 0 + [[ '' == \t\r\u\e ]] + sleep 10 + [[ true == \t\r\u\e ]] + set +x Waiting for cluster readyness................................................... + wait_for_running some-name-cfg 3 false + local name=some-name-cfg + let last_pod=2 + local check_cluster_readyness=false + set_debug + [[ 1 == 1 ]] + set -o xtrace + local rs_name=cfg + local cluster_name=some-name ++ seq 0 2 + for i in '$(seq 0 $last_pod)' + [[ 0 -eq 2 ]] + wait_pod some-name-cfg-0 + local pod=some-name-cfg-0 + set +o xtrace waiting for pod/some-name-cfg-0 to be ready.OK + for i in '$(seq 0 $last_pod)' + [[ 1 -eq 2 ]] + wait_pod some-name-cfg-1 + local pod=some-name-cfg-1 + set +o xtrace waiting for pod/some-name-cfg-1 to be ready.OK + for i in '$(seq 0 $last_pod)' + [[ 2 -eq 2 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="cfg")].arbiter.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.GGCwFhECin +++ mktemp ++ local LAST_ERR=/tmp/tmp.0izByXwi0B ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="cfg")].arbiter.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.GGCwFhECin ++ cat /tmp/tmp.0izByXwi0B ++ rm /tmp/tmp.GGCwFhECin /tmp/tmp.0izByXwi0B ++ return 0 + [[ '' == \t\r\u\e ]] + wait_pod some-name-cfg-2 + local pod=some-name-cfg-2 + set +o xtrace waiting for pod/some-name-cfg-2 to be ready.OK ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="cfg")].non_voting.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.j22eKtDjtG +++ mktemp ++ local LAST_ERR=/tmp/tmp.kXiQASkC2h ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="cfg")].non_voting.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.j22eKtDjtG ++ cat /tmp/tmp.kXiQASkC2h ++ rm /tmp/tmp.j22eKtDjtG /tmp/tmp.kXiQASkC2h ++ return 0 + [[ '' == \t\r\u\e ]] + sleep 10 + [[ false == \t\r\u\e ]] + wait_for_running some-name-mongos 3 + local name=some-name-mongos + let last_pod=2 + local check_cluster_readyness=true + set_debug + [[ 1 == 1 ]] + set -o xtrace + local rs_name=mongos + local cluster_name=some-name ++ seq 0 2 + for i in '$(seq 0 $last_pod)' + [[ 0 -eq 2 ]] + wait_pod some-name-mongos-0 + local pod=some-name-mongos-0 + set +o xtrace waiting for pod/some-name-mongos-0 to be ready.OK + for i in '$(seq 0 $last_pod)' + [[ 1 -eq 2 ]] + wait_pod some-name-mongos-1 + local pod=some-name-mongos-1 + set +o xtrace waiting for pod/some-name-mongos-1 to be ready.OK + for i in '$(seq 0 $last_pod)' + [[ 2 -eq 2 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="mongos")].arbiter.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.oZv2nCJjRO +++ mktemp ++ local LAST_ERR=/tmp/tmp.PXkLBpnQbV ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="mongos")].arbiter.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.oZv2nCJjRO ++ cat /tmp/tmp.PXkLBpnQbV ++ rm /tmp/tmp.oZv2nCJjRO /tmp/tmp.PXkLBpnQbV ++ return 0 + [[ '' == \t\r\u\e ]] + wait_pod some-name-mongos-2 + local pod=some-name-mongos-2 + set +o xtrace waiting for pod/some-name-mongos-2 to be ready.OK ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="mongos")].non_voting.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.G04VPHGv53 +++ mktemp ++ local LAST_ERR=/tmp/tmp.RQYeLpJten ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="mongos")].non_voting.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.G04VPHGv53 ++ cat /tmp/tmp.RQYeLpJten ++ rm /tmp/tmp.G04VPHGv53 /tmp/tmp.RQYeLpJten ++ return 0 + [[ '' == \t\r\u\e ]] + sleep 10 + [[ true == \t\r\u\e ]] + set +x Waiting for cluster readyness + sleep 10 + desc 'check if service and statefulset created with expected config' + set +o xtrace ----------------------------------------------------------------------------------- check if service and statefulset created with expected config ----------------------------------------------------------------------------------- + compare_kubectl statefulset/some-name-rs0 + local resource=statefulset/some-name-rs0 + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-rs0.yml + local new_result=/tmp/tmp.kUNddeZY37/statefulset_some-name-rs0.yml + '[' -n '' -a -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-rs0-oc.yml ']' + kubectl_bin get -o yaml statefulset/some-name-rs0 ++ mktemp + yq eval ' del(.metadata.ownerReferences[].apiVersion) | del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "NAMESPACE")) | del(.metadata.selfLink) | del(.metadata.annotations."cloud.google.com/neg") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.status) | (.. | select(tag == "!!str")) |= sub("demand-backup-sharded-19473", "NAME_SPACE") | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "extensions/v1beta1")) = "apps/v1" | (.. | select(. == "batch/v1beta1")) = "batch/v1" ' - + local LAST_OUT=/tmp/tmp.EVbIdZ2Ih2 ++ mktemp + local LAST_ERR=/tmp/tmp.q7LvFUV25S + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml statefulset/some-name-rs0 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.EVbIdZ2Ih2 + cat /tmp/tmp.q7LvFUV25S + rm /tmp/tmp.EVbIdZ2Ih2 /tmp/tmp.q7LvFUV25S + return 0 + yq -i eval 'del(.spec.persistentVolumeClaimRetentionPolicy)' /tmp/tmp.kUNddeZY37/statefulset_some-name-rs0.yml + version_gt 1.22 ++ echo '1.26 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + yq -i eval 'del(.spec.internalTrafficPolicy)' /tmp/tmp.kUNddeZY37/statefulset_some-name-rs0.yml + yq -i eval 'del(.spec.allocateLoadBalancerNodePorts)' /tmp/tmp.kUNddeZY37/statefulset_some-name-rs0.yml + [[ /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-rs0.yml == */cronjob* ]] + diff -u /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-rs0.yml /tmp/tmp.kUNddeZY37/statefulset_some-name-rs0.yml + compare_kubectl statefulset/some-name-rs1 + local resource=statefulset/some-name-rs1 + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-rs1.yml + local new_result=/tmp/tmp.kUNddeZY37/statefulset_some-name-rs1.yml + '[' -n '' -a -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-rs1-oc.yml ']' + kubectl_bin get -o yaml statefulset/some-name-rs1 + yq eval ' del(.metadata.ownerReferences[].apiVersion) | del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "NAMESPACE")) | del(.metadata.selfLink) | del(.metadata.annotations."cloud.google.com/neg") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.status) | (.. | select(tag == "!!str")) |= sub("demand-backup-sharded-19473", "NAME_SPACE") | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "extensions/v1beta1")) = "apps/v1" | (.. | select(. == "batch/v1beta1")) = "batch/v1" ' - ++ mktemp + local LAST_OUT=/tmp/tmp.zLx57vCqh4 ++ mktemp + local LAST_ERR=/tmp/tmp.lrk81UwIn9 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml statefulset/some-name-rs1 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.zLx57vCqh4 + cat /tmp/tmp.lrk81UwIn9 + rm /tmp/tmp.zLx57vCqh4 /tmp/tmp.lrk81UwIn9 + return 0 + yq -i eval 'del(.spec.persistentVolumeClaimRetentionPolicy)' /tmp/tmp.kUNddeZY37/statefulset_some-name-rs1.yml + version_gt 1.22 ++ echo '1.26 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + yq -i eval 'del(.spec.internalTrafficPolicy)' /tmp/tmp.kUNddeZY37/statefulset_some-name-rs1.yml + yq -i eval 'del(.spec.allocateLoadBalancerNodePorts)' /tmp/tmp.kUNddeZY37/statefulset_some-name-rs1.yml + [[ /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-rs1.yml == */cronjob* ]] + diff -u /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-rs1.yml /tmp/tmp.kUNddeZY37/statefulset_some-name-rs1.yml + compare_kubectl statefulset/some-name-rs2 + local resource=statefulset/some-name-rs2 + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-rs2.yml + local new_result=/tmp/tmp.kUNddeZY37/statefulset_some-name-rs2.yml + '[' -n '' -a -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-rs2-oc.yml ']' + kubectl_bin get -o yaml statefulset/some-name-rs2 ++ mktemp + yq eval ' del(.metadata.ownerReferences[].apiVersion) | del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "NAMESPACE")) | del(.metadata.selfLink) | del(.metadata.annotations."cloud.google.com/neg") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.status) | (.. | select(tag == "!!str")) |= sub("demand-backup-sharded-19473", "NAME_SPACE") | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "extensions/v1beta1")) = "apps/v1" | (.. | select(. == "batch/v1beta1")) = "batch/v1" ' - + local LAST_OUT=/tmp/tmp.fv0yHJb8dQ ++ mktemp + local LAST_ERR=/tmp/tmp.c3pQy79C3Z + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml statefulset/some-name-rs2 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.fv0yHJb8dQ + cat /tmp/tmp.c3pQy79C3Z + rm /tmp/tmp.fv0yHJb8dQ /tmp/tmp.c3pQy79C3Z + return 0 + yq -i eval 'del(.spec.persistentVolumeClaimRetentionPolicy)' /tmp/tmp.kUNddeZY37/statefulset_some-name-rs2.yml + version_gt 1.22 ++ echo '1.26 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + yq -i eval 'del(.spec.internalTrafficPolicy)' /tmp/tmp.kUNddeZY37/statefulset_some-name-rs2.yml + yq -i eval 'del(.spec.allocateLoadBalancerNodePorts)' /tmp/tmp.kUNddeZY37/statefulset_some-name-rs2.yml + [[ /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-rs2.yml == */cronjob* ]] + diff -u /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-rs2.yml /tmp/tmp.kUNddeZY37/statefulset_some-name-rs2.yml + compare_kubectl statefulset/some-name-cfg + local resource=statefulset/some-name-cfg + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-cfg.yml + local new_result=/tmp/tmp.kUNddeZY37/statefulset_some-name-cfg.yml + '[' -n '' -a -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-cfg-oc.yml ']' + kubectl_bin get -o yaml statefulset/some-name-cfg ++ mktemp + yq eval ' del(.metadata.ownerReferences[].apiVersion) | del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "NAMESPACE")) | del(.metadata.selfLink) | del(.metadata.annotations."cloud.google.com/neg") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.status) | (.. | select(tag == "!!str")) |= sub("demand-backup-sharded-19473", "NAME_SPACE") | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "extensions/v1beta1")) = "apps/v1" | (.. | select(. == "batch/v1beta1")) = "batch/v1" ' - + local LAST_OUT=/tmp/tmp.iC18ScKImw ++ mktemp + local LAST_ERR=/tmp/tmp.vEk5zQnTmV + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml statefulset/some-name-cfg + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.iC18ScKImw + cat /tmp/tmp.vEk5zQnTmV + rm /tmp/tmp.iC18ScKImw /tmp/tmp.vEk5zQnTmV + return 0 + yq -i eval 'del(.spec.persistentVolumeClaimRetentionPolicy)' /tmp/tmp.kUNddeZY37/statefulset_some-name-cfg.yml + version_gt 1.22 ++ echo '1.26 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + yq -i eval 'del(.spec.internalTrafficPolicy)' /tmp/tmp.kUNddeZY37/statefulset_some-name-cfg.yml + yq -i eval 'del(.spec.allocateLoadBalancerNodePorts)' /tmp/tmp.kUNddeZY37/statefulset_some-name-cfg.yml + [[ /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-cfg.yml == */cronjob* ]] + diff -u /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-cfg.yml /tmp/tmp.kUNddeZY37/statefulset_some-name-cfg.yml + compare_kubectl statefulset/some-name-mongos '' + local resource=statefulset/some-name-mongos + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-mongos.yml + local new_result=/tmp/tmp.kUNddeZY37/statefulset_some-name-mongos.yml + '[' -n '' -a -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-mongos-oc.yml ']' + kubectl_bin get -o yaml statefulset/some-name-mongos ++ mktemp + yq eval ' del(.metadata.ownerReferences[].apiVersion) | del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "NAMESPACE")) | del(.metadata.selfLink) | del(.metadata.annotations."cloud.google.com/neg") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.status) | (.. | select(tag == "!!str")) |= sub("demand-backup-sharded-19473", "NAME_SPACE") | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "extensions/v1beta1")) = "apps/v1" | (.. | select(. == "batch/v1beta1")) = "batch/v1" ' - + local LAST_OUT=/tmp/tmp.ILSCoZ5qzP ++ mktemp + local LAST_ERR=/tmp/tmp.hWtpwXvn6h + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml statefulset/some-name-mongos + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.ILSCoZ5qzP + cat /tmp/tmp.hWtpwXvn6h + rm /tmp/tmp.ILSCoZ5qzP /tmp/tmp.hWtpwXvn6h + return 0 + yq -i eval 'del(.spec.persistentVolumeClaimRetentionPolicy)' /tmp/tmp.kUNddeZY37/statefulset_some-name-mongos.yml + version_gt 1.22 ++ echo '1.26 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + yq -i eval 'del(.spec.internalTrafficPolicy)' /tmp/tmp.kUNddeZY37/statefulset_some-name-mongos.yml + yq -i eval 'del(.spec.allocateLoadBalancerNodePorts)' /tmp/tmp.kUNddeZY37/statefulset_some-name-mongos.yml + [[ /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-mongos.yml == */cronjob* ]] + diff -u /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-mongos.yml /tmp/tmp.kUNddeZY37/statefulset_some-name-mongos.yml + kubectl_bin apply -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/conf/mongos-secret.yml ++ mktemp + local LAST_OUT=/tmp/tmp.N1HTFdP1t9 ++ mktemp + local LAST_ERR=/tmp/tmp.FlDalaWzYK + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/conf/mongos-secret.yml + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.N1HTFdP1t9 secret/some-name-mongos created + cat /tmp/tmp.FlDalaWzYK + rm /tmp/tmp.N1HTFdP1t9 /tmp/tmp.FlDalaWzYK + return 0 + sleep 10 + wait_for_running some-name-mongos 3 + local name=some-name-mongos + let last_pod=2 + local check_cluster_readyness=true + set_debug + [[ 1 == 1 ]] + set -o xtrace + local rs_name=mongos + local cluster_name=some-name ++ seq 0 2 + for i in '$(seq 0 $last_pod)' + [[ 0 -eq 2 ]] + wait_pod some-name-mongos-0 + local pod=some-name-mongos-0 + set +o xtrace waiting for pod/some-name-mongos-0 to be ready.OK + for i in '$(seq 0 $last_pod)' + [[ 1 -eq 2 ]] + wait_pod some-name-mongos-1 + local pod=some-name-mongos-1 + set +o xtrace waiting for pod/some-name-mongos-1 to be ready.OK + for i in '$(seq 0 $last_pod)' + [[ 2 -eq 2 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="mongos")].arbiter.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.uJreImLDeA +++ mktemp ++ local LAST_ERR=/tmp/tmp.2gCpuEipJ6 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="mongos")].arbiter.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.uJreImLDeA ++ cat /tmp/tmp.2gCpuEipJ6 ++ rm /tmp/tmp.uJreImLDeA /tmp/tmp.2gCpuEipJ6 ++ return 0 + [[ '' == \t\r\u\e ]] + wait_pod some-name-mongos-2 + local pod=some-name-mongos-2 + set +o xtrace waiting for pod/some-name-mongos-2 to be ready.OK ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="mongos")].non_voting.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.9xZW1cLh0d +++ mktemp ++ local LAST_ERR=/tmp/tmp.xxMGvcwhZD ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="mongos")].non_voting.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.9xZW1cLh0d ++ cat /tmp/tmp.xxMGvcwhZD ++ rm /tmp/tmp.9xZW1cLh0d /tmp/tmp.xxMGvcwhZD ++ return 0 + [[ '' == \t\r\u\e ]] + sleep 10 + [[ true == \t\r\u\e ]] + set +x Waiting for cluster readyness.............................................................................................................. + compare_kubectl statefulset/some-name-mongos -secret + local resource=statefulset/some-name-mongos + local postfix=-secret + local expected_result=/mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-mongos-secret.yml + local new_result=/tmp/tmp.kUNddeZY37/statefulset_some-name-mongos.yml + '[' -n '' -a -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-mongos-secret-oc.yml ']' + kubectl_bin get -o yaml statefulset/some-name-mongos + yq eval ' del(.metadata.ownerReferences[].apiVersion) | del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "NAMESPACE")) | del(.metadata.selfLink) | del(.metadata.annotations."cloud.google.com/neg") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.status) | (.. | select(tag == "!!str")) |= sub("demand-backup-sharded-19473", "NAME_SPACE") | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "extensions/v1beta1")) = "apps/v1" | (.. | select(. == "batch/v1beta1")) = "batch/v1" ' - ++ mktemp + local LAST_OUT=/tmp/tmp.Ucv4mtPQgZ ++ mktemp + local LAST_ERR=/tmp/tmp.XFGi1UqOTf + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml statefulset/some-name-mongos + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.Ucv4mtPQgZ + cat /tmp/tmp.XFGi1UqOTf + rm /tmp/tmp.Ucv4mtPQgZ /tmp/tmp.XFGi1UqOTf + return 0 + yq -i eval 'del(.spec.persistentVolumeClaimRetentionPolicy)' /tmp/tmp.kUNddeZY37/statefulset_some-name-mongos.yml + version_gt 1.22 ++ echo '1.26 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + yq -i eval 'del(.spec.internalTrafficPolicy)' /tmp/tmp.kUNddeZY37/statefulset_some-name-mongos.yml + yq -i eval 'del(.spec.allocateLoadBalancerNodePorts)' /tmp/tmp.kUNddeZY37/statefulset_some-name-mongos.yml + [[ /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-mongos-secret.yml == */cronjob* ]] + diff -u /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-mongos-secret.yml /tmp/tmp.kUNddeZY37/statefulset_some-name-mongos.yml + desc 'write data, read from all' + set +o xtrace ----------------------------------------------------------------------------------- write data, read from all ----------------------------------------------------------------------------------- + run_mongos 'db.createUser({user:"myApp",pwd:"myPass",roles:[{db:"myApp",role:"readWrite"},{db:"myApp1",role:"readWrite"},{db:"myApp2",role:"readWrite"}]})' userAdmin:userAdmin123456@some-name-mongos.demand-backup-sharded-19473 + local 'command=db.createUser({user:"myApp",pwd:"myPass",roles:[{db:"myApp",role:"readWrite"},{db:"myApp1",role:"readWrite"},{db:"myApp2",role:"readWrite"}]})' + local uri=userAdmin:userAdmin123456@some-name-mongos.demand-backup-sharded-19473 + local driver=mongodb + local suffix=.svc.cluster.local ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.KIjXUKQMoa +++ mktemp ++ local LAST_ERR=/tmp/tmp.oSQm8W0ULJ ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.KIjXUKQMoa ++ cat /tmp/tmp.oSQm8W0ULJ ++ rm /tmp/tmp.KIjXUKQMoa /tmp/tmp.oSQm8W0ULJ ++ return 0 + local client_container=psmdb-client-7469665986-r8mgp + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''db.createUser({user:"myApp",pwd:"myPass",roles:[{db:"myApp",role:"readWrite"},{db:"myApp1",role:"readWrite"},{db:"myApp2",role:"readWrite"}]})\n'\'' | mongo mongodb://userAdmin:userAdmin123456@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.182Hn3i5KQ ++ mktemp + local LAST_ERR=/tmp/tmp.xVj1QCVRF6 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''db.createUser({user:"myApp",pwd:"myPass",roles:[{db:"myApp",role:"readWrite"},{db:"myApp1",role:"readWrite"},{db:"myApp2",role:"readWrite"}]})\n'\'' | mongo mongodb://userAdmin:userAdmin123456@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.182Hn3i5KQ Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-19473.svc.cluster.local:27017/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("e7779ade-ace5-4e2e-b0e3-0865ece65f68") } Percona Server for MongoDB server version: v7.0.11-6 WARNING: shell and server versions do not match Successfully added user: { "user" : "myApp", "roles" : [ { "db" : "myApp", "role" : "readWrite" }, { "db" : "myApp1", "role" : "readWrite" }, { "db" : "myApp2", "role" : "readWrite" } ] } bye + cat /tmp/tmp.xVj1QCVRF6 + rm /tmp/tmp.182Hn3i5KQ /tmp/tmp.xVj1QCVRF6 + return 0 + run_mongos 'sh.enableSharding("myApp","rs0")' clusterAdmin:clusterAdmin123456@some-name-mongos.demand-backup-sharded-19473 + local 'command=sh.enableSharding("myApp","rs0")' + local uri=clusterAdmin:clusterAdmin123456@some-name-mongos.demand-backup-sharded-19473 + local driver=mongodb + local suffix=.svc.cluster.local ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.UhFTE3hqG3 +++ mktemp ++ local LAST_ERR=/tmp/tmp.I4cPcxoIz6 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.UhFTE3hqG3 ++ cat /tmp/tmp.I4cPcxoIz6 ++ rm /tmp/tmp.UhFTE3hqG3 /tmp/tmp.I4cPcxoIz6 ++ return 0 + local client_container=psmdb-client-7469665986-r8mgp + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''sh.enableSharding("myApp","rs0")\n'\'' | mongo mongodb://clusterAdmin:clusterAdmin123456@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.afMulndC3u ++ mktemp + local LAST_ERR=/tmp/tmp.FxYdkY7rxd + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''sh.enableSharding("myApp","rs0")\n'\'' | mongo mongodb://clusterAdmin:clusterAdmin123456@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.afMulndC3u Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-19473.svc.cluster.local:27017/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("c4db132a-f5b2-4cca-ab78-c61bc6f11592") } Percona Server for MongoDB server version: v7.0.11-6 WARNING: shell and server versions do not match { "ok" : 1, "$clusterTime" : { "clusterTime" : Timestamp(1717513841, 13), "signature" : { "hash" : BinData(0,"fZBY35T56QBlxzPjHJSAs13o4qo="), "keyId" : NumberLong("7376664072420327447") } }, "operationTime" : Timestamp(1717513841, 7) } bye + cat /tmp/tmp.FxYdkY7rxd + rm /tmp/tmp.afMulndC3u /tmp/tmp.FxYdkY7rxd + return 0 + run_mongos 'sh.enableSharding("myApp1","rs1")' clusterAdmin:clusterAdmin123456@some-name-mongos.demand-backup-sharded-19473 + local 'command=sh.enableSharding("myApp1","rs1")' + local uri=clusterAdmin:clusterAdmin123456@some-name-mongos.demand-backup-sharded-19473 + local driver=mongodb + local suffix=.svc.cluster.local ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.818GFP3lKa +++ mktemp ++ local LAST_ERR=/tmp/tmp.6YwwKwp1RK ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.818GFP3lKa ++ cat /tmp/tmp.6YwwKwp1RK ++ rm /tmp/tmp.818GFP3lKa /tmp/tmp.6YwwKwp1RK ++ return 0 + local client_container=psmdb-client-7469665986-r8mgp + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''sh.enableSharding("myApp1","rs1")\n'\'' | mongo mongodb://clusterAdmin:clusterAdmin123456@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.Q6aCm3RbUb ++ mktemp + local LAST_ERR=/tmp/tmp.mrY2iKSdLC + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''sh.enableSharding("myApp1","rs1")\n'\'' | mongo mongodb://clusterAdmin:clusterAdmin123456@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.Q6aCm3RbUb Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-19473.svc.cluster.local:27017/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("389598ba-bfe1-4649-8894-a1941f6a5131") } Percona Server for MongoDB server version: v7.0.11-6 WARNING: shell and server versions do not match { "ok" : 1, "$clusterTime" : { "clusterTime" : Timestamp(1717513844, 8), "signature" : { "hash" : BinData(0,"fTW54w9n7DHIEnHkvoNKZnRu+2Q="), "keyId" : NumberLong("7376664072420327447") } }, "operationTime" : Timestamp(1717513844, 3) } bye + cat /tmp/tmp.mrY2iKSdLC + rm /tmp/tmp.Q6aCm3RbUb /tmp/tmp.mrY2iKSdLC + return 0 + run_mongos 'sh.enableSharding("myApp2","rs2")' clusterAdmin:clusterAdmin123456@some-name-mongos.demand-backup-sharded-19473 + local 'command=sh.enableSharding("myApp2","rs2")' + local uri=clusterAdmin:clusterAdmin123456@some-name-mongos.demand-backup-sharded-19473 + local driver=mongodb + local suffix=.svc.cluster.local ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.8La6vocR8R +++ mktemp ++ local LAST_ERR=/tmp/tmp.dH3iaQjCgZ ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.8La6vocR8R ++ cat /tmp/tmp.dH3iaQjCgZ ++ rm /tmp/tmp.8La6vocR8R /tmp/tmp.dH3iaQjCgZ ++ return 0 + local client_container=psmdb-client-7469665986-r8mgp + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''sh.enableSharding("myApp2","rs2")\n'\'' | mongo mongodb://clusterAdmin:clusterAdmin123456@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.jZwL1QnCxY ++ mktemp + local LAST_ERR=/tmp/tmp.kEWQzSmZCu + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''sh.enableSharding("myApp2","rs2")\n'\'' | mongo mongodb://clusterAdmin:clusterAdmin123456@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.jZwL1QnCxY Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-19473.svc.cluster.local:27017/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("db7be77c-945c-411b-ba63-ff162704af31") } Percona Server for MongoDB server version: v7.0.11-6 WARNING: shell and server versions do not match { "ok" : 1, "$clusterTime" : { "clusterTime" : Timestamp(1717513847, 1), "signature" : { "hash" : BinData(0,"uHE7Ioe4fW6I6P75vNDnyLPcnGo="), "keyId" : NumberLong("7376664072420327447") } }, "operationTime" : Timestamp(1717513846, 9) } bye + cat /tmp/tmp.kEWQzSmZCu + rm /tmp/tmp.jZwL1QnCxY /tmp/tmp.kEWQzSmZCu + return 0 + insert_data_mongos 100500 myApp + local data=100500 + local db_name=myApp + local flags= + run_mongos 'use myApp\n db.test.insert({ x: 100500 })' myApp:myPass@some-name-mongos.demand-backup-sharded-19473 '' '' '' + local 'command=use myApp\n db.test.insert({ x: 100500 })' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local driver=mongodb + local suffix=.svc.cluster.local ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.brQWNncScP +++ mktemp ++ local LAST_ERR=/tmp/tmp.zde6mTZLfx ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.brQWNncScP ++ cat /tmp/tmp.zde6mTZLfx ++ rm /tmp/tmp.brQWNncScP /tmp/tmp.zde6mTZLfx ++ return 0 + local client_container=psmdb-client-7469665986-r8mgp + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp\n db.test.insert({ x: 100500 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.DdlRYZfkvW ++ mktemp + local LAST_ERR=/tmp/tmp.Nd0aXA7kIK + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp\n db.test.insert({ x: 100500 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.DdlRYZfkvW Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-19473.svc.cluster.local:27017/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("a6b38baa-1781-40e8-896b-c2f7ef163bf9") } Percona Server for MongoDB server version: v7.0.11-6 WARNING: shell and server versions do not match switched to db myApp WriteResult({ "nInserted" : 1 }) bye + cat /tmp/tmp.Nd0aXA7kIK + rm /tmp/tmp.DdlRYZfkvW /tmp/tmp.Nd0aXA7kIK + return 0 + insert_data_mongos 100500 myApp1 + local data=100500 + local db_name=myApp1 + local flags= + run_mongos 'use myApp1\n db.test.insert({ x: 100500 })' myApp:myPass@some-name-mongos.demand-backup-sharded-19473 '' '' '' + local 'command=use myApp1\n db.test.insert({ x: 100500 })' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local driver=mongodb + local suffix=.svc.cluster.local ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.DiVeEb10XL +++ mktemp ++ local LAST_ERR=/tmp/tmp.cox9OKTq4V ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.DiVeEb10XL ++ cat /tmp/tmp.cox9OKTq4V ++ rm /tmp/tmp.DiVeEb10XL /tmp/tmp.cox9OKTq4V ++ return 0 + local client_container=psmdb-client-7469665986-r8mgp + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp1\n db.test.insert({ x: 100500 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.zafevrHe31 ++ mktemp + local LAST_ERR=/tmp/tmp.TAO1sWovXx + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp1\n db.test.insert({ x: 100500 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.zafevrHe31 Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-19473.svc.cluster.local:27017/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("81886ce9-f118-4e7a-8ae0-935fee3f7a39") } Percona Server for MongoDB server version: v7.0.11-6 WARNING: shell and server versions do not match switched to db myApp1 WriteResult({ "nInserted" : 1 }) bye + cat /tmp/tmp.TAO1sWovXx + rm /tmp/tmp.zafevrHe31 /tmp/tmp.TAO1sWovXx + return 0 + insert_data_mongos 100500 myApp2 + local data=100500 + local db_name=myApp2 + local flags= + run_mongos 'use myApp2\n db.test.insert({ x: 100500 })' myApp:myPass@some-name-mongos.demand-backup-sharded-19473 '' '' '' + local 'command=use myApp2\n db.test.insert({ x: 100500 })' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local driver=mongodb + local suffix=.svc.cluster.local ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.4yVZc1K7xg +++ mktemp ++ local LAST_ERR=/tmp/tmp.9mGHWKMXG8 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.4yVZc1K7xg ++ cat /tmp/tmp.9mGHWKMXG8 ++ rm /tmp/tmp.4yVZc1K7xg /tmp/tmp.9mGHWKMXG8 ++ return 0 + local client_container=psmdb-client-7469665986-r8mgp + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp2\n db.test.insert({ x: 100500 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.FIRZr4xGax ++ mktemp + local LAST_ERR=/tmp/tmp.Qg3EXGoVMF + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp2\n db.test.insert({ x: 100500 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.FIRZr4xGax Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-19473.svc.cluster.local:27017/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("97f7d137-fbe7-4152-b3e8-4026c8bee6b4") } Percona Server for MongoDB server version: v7.0.11-6 WARNING: shell and server versions do not match switched to db myApp2 WriteResult({ "nInserted" : 1 }) bye + cat /tmp/tmp.Qg3EXGoVMF + rm /tmp/tmp.FIRZr4xGax /tmp/tmp.Qg3EXGoVMF + return 0 + minikube_sleep + sleep_time=10 + [[ '' == 1 ]] + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local postfix= + local suffix= + local database=myApp + local collection=test + run_mongos 'use myApp\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-19473 mongodb '' + local 'command=use myApp\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local driver=mongodb + local suffix=.svc.cluster.local + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.JvHYi37g3Z +++ mktemp ++ local LAST_ERR=/tmp/tmp.6h4E1yHWBC ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.JvHYi37g3Z ++ cat /tmp/tmp.6h4E1yHWBC ++ rm /tmp/tmp.JvHYi37g3Z /tmp/tmp.6h4E1yHWBC ++ return 0 + local client_container=psmdb-client-7469665986-r8mgp + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.PaEEk3iDEk ++ mktemp + local LAST_ERR=/tmp/tmp.6AUTTKLclj + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.PaEEk3iDEk + cat /tmp/tmp.6AUTTKLclj + rm /tmp/tmp.PaEEk3iDEk /tmp/tmp.6AUTTKLclj + return 0 + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/compare/find.json /tmp/tmp.kUNddeZY37/find + wait_backup_agent some-name-rs0-0 + local agent_pod=some-name-rs0-0 + set +o xtrace some-name-rs0-0 + wait_backup_agent some-name-rs0-1 + local agent_pod=some-name-rs0-1 + set +o xtrace some-name-rs0-1 + wait_backup_agent some-name-rs0-2 + local agent_pod=some-name-rs0-2 + set +o xtrace some-name-rs0-2 + wait_backup_agent some-name-rs1-0 + local agent_pod=some-name-rs1-0 + set +o xtrace some-name-rs1-0 + wait_backup_agent some-name-rs1-1 + local agent_pod=some-name-rs1-1 + set +o xtrace some-name-rs1-1 + wait_backup_agent some-name-rs1-2 + local agent_pod=some-name-rs1-2 + set +o xtrace some-name-rs1-2 + wait_backup_agent some-name-rs2-0 + local agent_pod=some-name-rs2-0 + set +o xtrace some-name-rs2-0 + wait_backup_agent some-name-rs2-1 + local agent_pod=some-name-rs2-1 + set +o xtrace some-name-rs2-1 + wait_backup_agent some-name-rs2-2 + local agent_pod=some-name-rs2-2 + set +o xtrace some-name-rs2-2 + backup_name_aws=backup-aws-s3 + backup_name_minio=backup-minio + backup_name_gcp=backup-gcp-cs + backup_name_azure=backup-azure-blob + desc 'run backups' + set +o xtrace ----------------------------------------------------------------------------------- run backups ----------------------------------------------------------------------------------- + run_backup minio + local storage=minio + local backup_name=backup-minio + desc 'run backup backup-minio' + set +o xtrace ----------------------------------------------------------------------------------- run backup backup-minio ----------------------------------------------------------------------------------- + kubectl_bin apply -f - + yq eval '.metadata.name = "backup-minio" | .spec.storageName = "minio"' /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/conf/backup-minio.yml ++ mktemp + local LAST_OUT=/tmp/tmp.USdrlJnEfo ++ mktemp + local LAST_ERR=/tmp/tmp.u9OaDYcL6m + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.USdrlJnEfo perconaservermongodbbackup.psmdb.percona.com/backup-minio created + cat /tmp/tmp.u9OaDYcL6m + rm /tmp/tmp.USdrlJnEfo /tmp/tmp.u9OaDYcL6m + return 0 + '[' -z '' ']' + run_backup aws-s3 + local storage=aws-s3 + local backup_name=backup-aws-s3 + desc 'run backup backup-aws-s3' + set +o xtrace ----------------------------------------------------------------------------------- run backup backup-aws-s3 ----------------------------------------------------------------------------------- + yq eval '.metadata.name = "backup-aws-s3" | .spec.storageName = "aws-s3"' /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/conf/backup-aws-s3.yml + kubectl_bin apply -f - ++ mktemp + local LAST_OUT=/tmp/tmp.Z2K61RZCMx ++ mktemp + local LAST_ERR=/tmp/tmp.UIcKhnSR95 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.Z2K61RZCMx perconaservermongodbbackup.psmdb.percona.com/backup-aws-s3 created + cat /tmp/tmp.UIcKhnSR95 + rm /tmp/tmp.Z2K61RZCMx /tmp/tmp.UIcKhnSR95 + return 0 + run_backup gcp-cs + local storage=gcp-cs + local backup_name=backup-gcp-cs + desc 'run backup backup-gcp-cs' + set +o xtrace ----------------------------------------------------------------------------------- run backup backup-gcp-cs ----------------------------------------------------------------------------------- + yq eval '.metadata.name = "backup-gcp-cs" | .spec.storageName = "gcp-cs"' /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/conf/backup-gcp-cs.yml + kubectl_bin apply -f - ++ mktemp + local LAST_OUT=/tmp/tmp.0zgexhMbEd ++ mktemp + local LAST_ERR=/tmp/tmp.qQjdXK4nyK + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.0zgexhMbEd perconaservermongodbbackup.psmdb.percona.com/backup-gcp-cs created + cat /tmp/tmp.qQjdXK4nyK + rm /tmp/tmp.0zgexhMbEd /tmp/tmp.qQjdXK4nyK + return 0 + run_backup azure-blob + local storage=azure-blob + local backup_name=backup-azure-blob + desc 'run backup backup-azure-blob' + set +o xtrace ----------------------------------------------------------------------------------- run backup backup-azure-blob ----------------------------------------------------------------------------------- + yq eval '.metadata.name = "backup-azure-blob" | .spec.storageName = "azure-blob"' /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/conf/backup-azure-blob.yml + kubectl_bin apply -f - ++ mktemp + local LAST_OUT=/tmp/tmp.fDEZrQlDGU ++ mktemp + local LAST_ERR=/tmp/tmp.Susvmza9mn + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.fDEZrQlDGU perconaservermongodbbackup.psmdb.percona.com/backup-azure-blob created + cat /tmp/tmp.Susvmza9mn + rm /tmp/tmp.fDEZrQlDGU /tmp/tmp.Susvmza9mn + return 0 + wait_backup backup-aws-s3 + local backup_name=backup-aws-s3 + set +o xtrace backup-aws-s3............................................... + wait_backup backup-gcp-cs + local backup_name=backup-gcp-cs + set +o xtrace backup-gcp-cs........................... + wait_backup backup-azure-blob + local backup_name=backup-azure-blob + set +o xtrace backup-azure-blob........................ + wait_backup backup-minio + local backup_name=backup-minio + set +o xtrace backup-minio. + sleep 5 + '[' -z '' ']' + desc 'check backup and restore -- aws-s3' + set +o xtrace ----------------------------------------------------------------------------------- check backup and restore -- aws-s3 ----------------------------------------------------------------------------------- ++ get_backup_dest backup-aws-s3 ++ local backup_name=backup-aws-s3 ++ kubectl_bin get psmdb-backup backup-aws-s3 -o 'jsonpath={.status.destination}' ++ sed -e 's/.json$//' ++ sed 's|s3://||' ++ sed 's|azure://||' +++ mktemp ++ local LAST_OUT=/tmp/tmp.R2P8c9Hihg +++ mktemp ++ local LAST_ERR=/tmp/tmp.2m1ekylxHx ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb-backup backup-aws-s3 -o 'jsonpath={.status.destination}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.R2P8c9Hihg ++ cat /tmp/tmp.2m1ekylxHx ++ rm /tmp/tmp.R2P8c9Hihg /tmp/tmp.2m1ekylxHx ++ return 0 + backup_dest_aws=operator-testing/psmdb-demand-backup-sharded/2024-06-04T15:12:11Z + curl -s https://s3.amazonaws.com/operator-testing/psmdb-demand-backup-sharded/2024-06-04T15:12:11Z/rs0/myApp.test.gz + gunzip + curl -s https://s3.amazonaws.com/operator-testing/psmdb-demand-backup-sharded/2024-06-04T15:12:11Z/rs1/myApp1.test.gz + gunzip + curl -s https://s3.amazonaws.com/operator-testing/psmdb-demand-backup-sharded/2024-06-04T15:12:11Z/rs2/myApp2.test.gz + gunzip + insert_data_mongos 100501 myApp + local data=100501 + local db_name=myApp + local flags= + run_mongos 'use myApp\n db.test.insert({ x: 100501 })' myApp:myPass@some-name-mongos.demand-backup-sharded-19473 '' '' '' + local 'command=use myApp\n db.test.insert({ x: 100501 })' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local driver=mongodb + local suffix=.svc.cluster.local ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.42t7CGjsB7 +++ mktemp ++ local LAST_ERR=/tmp/tmp.QAA4xGYSv3 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.42t7CGjsB7 ++ cat /tmp/tmp.QAA4xGYSv3 ++ rm /tmp/tmp.42t7CGjsB7 /tmp/tmp.QAA4xGYSv3 ++ return 0 + local client_container=psmdb-client-7469665986-r8mgp + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.LxHl1t7QI4 ++ mktemp + local LAST_ERR=/tmp/tmp.OAGDRiyahg + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.LxHl1t7QI4 Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-19473.svc.cluster.local:27017/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("3d08a3ab-6c01-4ad7-aca9-4eb5db8167be") } Percona Server for MongoDB server version: v7.0.11-6 WARNING: shell and server versions do not match switched to db myApp WriteResult({ "nInserted" : 1 }) bye + cat /tmp/tmp.OAGDRiyahg + rm /tmp/tmp.LxHl1t7QI4 /tmp/tmp.OAGDRiyahg + return 0 + insert_data_mongos 100501 myApp1 + local data=100501 + local db_name=myApp1 + local flags= + run_mongos 'use myApp1\n db.test.insert({ x: 100501 })' myApp:myPass@some-name-mongos.demand-backup-sharded-19473 '' '' '' + local 'command=use myApp1\n db.test.insert({ x: 100501 })' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local driver=mongodb + local suffix=.svc.cluster.local ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.VVQpOLSXeY +++ mktemp ++ local LAST_ERR=/tmp/tmp.vbK0BrWoy6 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.VVQpOLSXeY ++ cat /tmp/tmp.vbK0BrWoy6 ++ rm /tmp/tmp.VVQpOLSXeY /tmp/tmp.vbK0BrWoy6 ++ return 0 + local client_container=psmdb-client-7469665986-r8mgp + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp1\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.5CdICPprER ++ mktemp + local LAST_ERR=/tmp/tmp.OgOS0XZD81 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp1\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.5CdICPprER Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-19473.svc.cluster.local:27017/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("a6f54f6e-5e35-49d2-93a5-5686dde90fe2") } Percona Server for MongoDB server version: v7.0.11-6 WARNING: shell and server versions do not match switched to db myApp1 WriteResult({ "nInserted" : 1 }) bye + cat /tmp/tmp.OgOS0XZD81 + rm /tmp/tmp.5CdICPprER /tmp/tmp.OgOS0XZD81 + return 0 + insert_data_mongos 100501 myApp2 + local data=100501 + local db_name=myApp2 + local flags= + run_mongos 'use myApp2\n db.test.insert({ x: 100501 })' myApp:myPass@some-name-mongos.demand-backup-sharded-19473 '' '' '' + local 'command=use myApp2\n db.test.insert({ x: 100501 })' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local driver=mongodb + local suffix=.svc.cluster.local ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.3f04fB7ysE +++ mktemp ++ local LAST_ERR=/tmp/tmp.0nszyxLtzU ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.3f04fB7ysE ++ cat /tmp/tmp.0nszyxLtzU ++ rm /tmp/tmp.3f04fB7ysE /tmp/tmp.0nszyxLtzU ++ return 0 + local client_container=psmdb-client-7469665986-r8mgp + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp2\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.B388eCDmdE ++ mktemp + local LAST_ERR=/tmp/tmp.UTwdljbJQi + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp2\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.B388eCDmdE Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-19473.svc.cluster.local:27017/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("e3760c16-8295-42cc-a33e-eac437851811") } Percona Server for MongoDB server version: v7.0.11-6 WARNING: shell and server versions do not match switched to db myApp2 WriteResult({ "nInserted" : 1 }) bye + cat /tmp/tmp.UTwdljbJQi + rm /tmp/tmp.B388eCDmdE /tmp/tmp.UTwdljbJQi + return 0 + check_data -2nd + local postfix=-2nd ++ seq 0 2 + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-19473 -2nd .svc.cluster.local myApp test + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local postfix=-2nd + local suffix=.svc.cluster.local + local database=myApp + local collection=test + run_mongos 'use myApp\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-19473 mongodb .svc.cluster.local + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + local 'command=use myApp\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local driver=mongodb + local suffix=.svc.cluster.local + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.y4x8dTnbuu +++ mktemp ++ local LAST_ERR=/tmp/tmp.R0cspnXEjF ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.y4x8dTnbuu ++ cat /tmp/tmp.R0cspnXEjF ++ rm /tmp/tmp.y4x8dTnbuu /tmp/tmp.R0cspnXEjF ++ return 0 + local client_container=psmdb-client-7469665986-r8mgp + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.vs1eKw8iWj ++ mktemp + local LAST_ERR=/tmp/tmp.MW1jm038C1 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.vs1eKw8iWj + cat /tmp/tmp.MW1jm038C1 + rm /tmp/tmp.vs1eKw8iWj /tmp/tmp.MW1jm038C1 + return 0 + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/compare/find-2nd.json /tmp/tmp.kUNddeZY37/find-2nd + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-19473 -2nd1 .svc.cluster.local myApp1 test + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local postfix=-2nd1 + local suffix=.svc.cluster.local + local database=myApp1 + local collection=test + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' + run_mongos 'use myApp1\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-19473 mongodb .svc.cluster.local + local 'command=use myApp1\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local driver=mongodb + local suffix=.svc.cluster.local ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.PvALIay5wd +++ mktemp ++ local LAST_ERR=/tmp/tmp.MFiupQDmlT ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.PvALIay5wd ++ cat /tmp/tmp.MFiupQDmlT ++ rm /tmp/tmp.PvALIay5wd /tmp/tmp.MFiupQDmlT ++ return 0 + local client_container=psmdb-client-7469665986-r8mgp + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp1\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.s34GokkuI3 ++ mktemp + local LAST_ERR=/tmp/tmp.vzkUrE3X7w + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp1\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.s34GokkuI3 + cat /tmp/tmp.vzkUrE3X7w + rm /tmp/tmp.s34GokkuI3 /tmp/tmp.vzkUrE3X7w + return 0 + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/compare/find-2nd1.json /tmp/tmp.kUNddeZY37/find-2nd1 + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-19473 -2nd2 .svc.cluster.local myApp2 test + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local postfix=-2nd2 + local suffix=.svc.cluster.local + local database=myApp2 + local collection=test + run_mongos 'use myApp2\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-19473 mongodb .svc.cluster.local + local 'command=use myApp2\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + local driver=mongodb + local suffix=.svc.cluster.local + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.2kxUaI4OKV +++ mktemp ++ local LAST_ERR=/tmp/tmp.ew5jt2JWto ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.2kxUaI4OKV ++ cat /tmp/tmp.ew5jt2JWto ++ rm /tmp/tmp.2kxUaI4OKV /tmp/tmp.ew5jt2JWto ++ return 0 + local client_container=psmdb-client-7469665986-r8mgp + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp2\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.x8kMGXvj2c ++ mktemp + local LAST_ERR=/tmp/tmp.cU0mswbPmp + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp2\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.x8kMGXvj2c + cat /tmp/tmp.cU0mswbPmp + rm /tmp/tmp.x8kMGXvj2c /tmp/tmp.cU0mswbPmp + return 0 + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/compare/find-2nd2.json /tmp/tmp.kUNddeZY37/find-2nd2 + run_restore backup-aws-s3 + local backup_name=backup-aws-s3 + cat /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/conf/restore.yml + /usr/bin/sed -e 's/name:/name: restore-backup-aws-s3/' + /usr/bin/sed -e 's/backupName:/backupName: backup-aws-s3/' + kubectl_bin apply -f - ++ mktemp + local LAST_OUT=/tmp/tmp.rLKC4FQIWC ++ mktemp + local LAST_ERR=/tmp/tmp.CvP5MVYjVU + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.rLKC4FQIWC perconaservermongodbrestore.psmdb.percona.com/restore-backup-aws-s3 created + cat /tmp/tmp.CvP5MVYjVU + rm /tmp/tmp.rLKC4FQIWC /tmp/tmp.CvP5MVYjVU + return 0 + wait_restore backup-aws-s3 some-name + local backup_name=backup-aws-s3 + local cluster_name=some-name + local target_state=ready + local wait_cluster_consistency=1 + local wait_time=780 + set +o xtrace waiting psmdb-restore/backup-aws-s3 to reach ready state.................... + '[' 1 -eq 1 ']' + wait_cluster_consistency some-name + local cluster_name=some-name + local wait_time=32 + retry=0 + sleep 7 + echo -n 'waiting for cluster readyness' waiting for cluster readyness++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.yruWNycsZo +++ mktemp ++ local LAST_ERR=/tmp/tmp.YZ7bztLVli ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.yruWNycsZo ++ cat /tmp/tmp.YZ7bztLVli ++ rm /tmp/tmp.yruWNycsZo /tmp/tmp.YZ7bztLVli ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 1 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.k3MoXy6VmV +++ mktemp ++ local LAST_ERR=/tmp/tmp.qOm5rm1Yt6 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.k3MoXy6VmV ++ cat /tmp/tmp.qOm5rm1Yt6 ++ rm /tmp/tmp.k3MoXy6VmV /tmp/tmp.qOm5rm1Yt6 ++ return 0 + [[ error == \r\e\a\d\y ]] + let retry+=1 + '[' 2 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.w1521Oh7uW +++ mktemp ++ local LAST_ERR=/tmp/tmp.V0WdQMbque ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.w1521Oh7uW ++ cat /tmp/tmp.V0WdQMbque ++ rm /tmp/tmp.w1521Oh7uW /tmp/tmp.V0WdQMbque ++ return 0 + [[ error == \r\e\a\d\y ]] + let retry+=1 + '[' 3 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.KPryV0D2i6 +++ mktemp ++ local LAST_ERR=/tmp/tmp.0UMZ1u53fg ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.KPryV0D2i6 ++ cat /tmp/tmp.0UMZ1u53fg ++ rm /tmp/tmp.KPryV0D2i6 /tmp/tmp.0UMZ1u53fg ++ return 0 + [[ error == \r\e\a\d\y ]] + let retry+=1 + '[' 4 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.FsDfDPKRMy +++ mktemp ++ local LAST_ERR=/tmp/tmp.mGRqWHVz2n ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.FsDfDPKRMy ++ cat /tmp/tmp.mGRqWHVz2n ++ rm /tmp/tmp.FsDfDPKRMy /tmp/tmp.mGRqWHVz2n ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 5 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Z8AfZobfAk +++ mktemp ++ local LAST_ERR=/tmp/tmp.o7dqguEIBe ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.Z8AfZobfAk ++ cat /tmp/tmp.o7dqguEIBe ++ rm /tmp/tmp.Z8AfZobfAk /tmp/tmp.o7dqguEIBe ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 6 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.CJDOpUDfbA +++ mktemp ++ local LAST_ERR=/tmp/tmp.lS1Fi3EGIV ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.CJDOpUDfbA ++ cat /tmp/tmp.lS1Fi3EGIV ++ rm /tmp/tmp.CJDOpUDfbA /tmp/tmp.lS1Fi3EGIV ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 7 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.BAhESQ5VKF +++ mktemp ++ local LAST_ERR=/tmp/tmp.6r1iu0kPcH ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.BAhESQ5VKF ++ cat /tmp/tmp.6r1iu0kPcH ++ rm /tmp/tmp.BAhESQ5VKF /tmp/tmp.6r1iu0kPcH ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 8 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.6wOwZ6ClVV +++ mktemp ++ local LAST_ERR=/tmp/tmp.Jm6VcH235M ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.6wOwZ6ClVV ++ cat /tmp/tmp.Jm6VcH235M ++ rm /tmp/tmp.6wOwZ6ClVV /tmp/tmp.Jm6VcH235M ++ return 0 + [[ ready == \r\e\a\d\y ]] + check_data + local postfix= ++ seq 0 2 + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-19473 '' .svc.cluster.local myApp test + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local postfix= + local suffix=.svc.cluster.local + local database=myApp + local collection=test + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' + run_mongos 'use myApp\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-19473 mongodb .svc.cluster.local + local 'command=use myApp\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local driver=mongodb + local suffix=.svc.cluster.local ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.fIQldIUJYk +++ mktemp ++ local LAST_ERR=/tmp/tmp.gyTEgH7MB3 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.fIQldIUJYk ++ cat /tmp/tmp.gyTEgH7MB3 ++ rm /tmp/tmp.fIQldIUJYk /tmp/tmp.gyTEgH7MB3 ++ return 0 + local client_container=psmdb-client-7469665986-r8mgp + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.IkqVrS0k9T ++ mktemp + local LAST_ERR=/tmp/tmp.SKujDMZRQV + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.IkqVrS0k9T + cat /tmp/tmp.SKujDMZRQV + rm /tmp/tmp.IkqVrS0k9T /tmp/tmp.SKujDMZRQV + return 0 + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/compare/find.json /tmp/tmp.kUNddeZY37/find + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-19473 1 .svc.cluster.local myApp1 test + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local postfix=1 + local suffix=.svc.cluster.local + local database=myApp1 + local collection=test + run_mongos 'use myApp1\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-19473 mongodb .svc.cluster.local + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + local 'command=use myApp1\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local driver=mongodb + local suffix=.svc.cluster.local + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.z94YW3P1PJ +++ mktemp ++ local LAST_ERR=/tmp/tmp.SBvf1k3v6f ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.z94YW3P1PJ ++ cat /tmp/tmp.SBvf1k3v6f ++ rm /tmp/tmp.z94YW3P1PJ /tmp/tmp.SBvf1k3v6f ++ return 0 + local client_container=psmdb-client-7469665986-r8mgp + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp1\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.RLSAUGjivN ++ mktemp + local LAST_ERR=/tmp/tmp.skKcLUr2CT + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp1\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.RLSAUGjivN + cat /tmp/tmp.skKcLUr2CT + rm /tmp/tmp.RLSAUGjivN /tmp/tmp.skKcLUr2CT + return 0 + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/compare/find1.json /tmp/tmp.kUNddeZY37/find1 + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-19473 2 .svc.cluster.local myApp2 test + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local postfix=2 + local suffix=.svc.cluster.local + local database=myApp2 + local collection=test + run_mongos 'use myApp2\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-19473 mongodb .svc.cluster.local + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + local 'command=use myApp2\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local driver=mongodb + local suffix=.svc.cluster.local + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.CtVzgLXqMX +++ mktemp ++ local LAST_ERR=/tmp/tmp.GBaalPdagl ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.CtVzgLXqMX ++ cat /tmp/tmp.GBaalPdagl ++ rm /tmp/tmp.CtVzgLXqMX /tmp/tmp.GBaalPdagl ++ return 0 + local client_container=psmdb-client-7469665986-r8mgp + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp2\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.yP1IPdRpS2 ++ mktemp + local LAST_ERR=/tmp/tmp.YaZTtYTaMa + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp2\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.yP1IPdRpS2 + cat /tmp/tmp.YaZTtYTaMa + rm /tmp/tmp.yP1IPdRpS2 /tmp/tmp.YaZTtYTaMa + return 0 + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/compare/find2.json /tmp/tmp.kUNddeZY37/find2 + desc 'check backup and restore -- gcp-cs' + set +o xtrace ----------------------------------------------------------------------------------- check backup and restore -- gcp-cs ----------------------------------------------------------------------------------- ++ get_backup_dest backup-gcp-cs ++ local backup_name=backup-gcp-cs ++ kubectl_bin get psmdb-backup backup-gcp-cs -o 'jsonpath={.status.destination}' ++ sed -e 's/.json$//' ++ sed 's|s3://||' +++ mktemp ++ sed 's|azure://||' ++ local LAST_OUT=/tmp/tmp.SwXNr2Yj0I +++ mktemp ++ local LAST_ERR=/tmp/tmp.MwhpR4chgZ ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb-backup backup-gcp-cs -o 'jsonpath={.status.destination}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.SwXNr2Yj0I ++ cat /tmp/tmp.MwhpR4chgZ ++ rm /tmp/tmp.SwXNr2Yj0I /tmp/tmp.MwhpR4chgZ ++ return 0 + backup_dest_gcp=operator-testing/psmdb-demand-backup-sharded/2024-06-04T15:12:53Z + curl -s https://storage.googleapis.com/operator-testing/psmdb-demand-backup-sharded/2024-06-04T15:12:53Z/rs0/myApp.test.gz + gunzip + gunzip + curl -s https://storage.googleapis.com/operator-testing/psmdb-demand-backup-sharded/2024-06-04T15:12:53Z/rs1/myApp1.test.gz + curl -s https://storage.googleapis.com/operator-testing/psmdb-demand-backup-sharded/2024-06-04T15:12:53Z/rs2/myApp2.test.gz + gunzip + insert_data_mongos 100501 myApp + local data=100501 + local db_name=myApp + local flags= + run_mongos 'use myApp\n db.test.insert({ x: 100501 })' myApp:myPass@some-name-mongos.demand-backup-sharded-19473 '' '' '' + local 'command=use myApp\n db.test.insert({ x: 100501 })' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local driver=mongodb + local suffix=.svc.cluster.local ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.iU4n9nRYGP +++ mktemp ++ local LAST_ERR=/tmp/tmp.mC04gw9eEv ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.iU4n9nRYGP ++ cat /tmp/tmp.mC04gw9eEv ++ rm /tmp/tmp.iU4n9nRYGP /tmp/tmp.mC04gw9eEv ++ return 0 + local client_container=psmdb-client-7469665986-r8mgp + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.9bxsMqxXdT ++ mktemp + local LAST_ERR=/tmp/tmp.n5q8Y4pprX + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.9bxsMqxXdT Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-19473.svc.cluster.local:27017/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("be16bf0f-967d-42a9-88d9-78861118210c") } Percona Server for MongoDB server version: v7.0.11-6 WARNING: shell and server versions do not match switched to db myApp WriteResult({ "nInserted" : 1 }) bye + cat /tmp/tmp.n5q8Y4pprX + rm /tmp/tmp.9bxsMqxXdT /tmp/tmp.n5q8Y4pprX + return 0 + insert_data_mongos 100501 myApp1 + local data=100501 + local db_name=myApp1 + local flags= + run_mongos 'use myApp1\n db.test.insert({ x: 100501 })' myApp:myPass@some-name-mongos.demand-backup-sharded-19473 '' '' '' + local 'command=use myApp1\n db.test.insert({ x: 100501 })' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local driver=mongodb + local suffix=.svc.cluster.local ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.c6dp5mweec +++ mktemp ++ local LAST_ERR=/tmp/tmp.iCof7IRoAU ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.c6dp5mweec ++ cat /tmp/tmp.iCof7IRoAU ++ rm /tmp/tmp.c6dp5mweec /tmp/tmp.iCof7IRoAU ++ return 0 + local client_container=psmdb-client-7469665986-r8mgp + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp1\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.pZfE1z2LDK ++ mktemp + local LAST_ERR=/tmp/tmp.QOib2ihyyD + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp1\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.pZfE1z2LDK Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-19473.svc.cluster.local:27017/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("93d29f94-527f-49a0-8444-b00d6737c5e4") } Percona Server for MongoDB server version: v7.0.11-6 WARNING: shell and server versions do not match switched to db myApp1 WriteResult({ "nInserted" : 1 }) bye + cat /tmp/tmp.QOib2ihyyD + rm /tmp/tmp.pZfE1z2LDK /tmp/tmp.QOib2ihyyD + return 0 + insert_data_mongos 100501 myApp2 + local data=100501 + local db_name=myApp2 + local flags= + run_mongos 'use myApp2\n db.test.insert({ x: 100501 })' myApp:myPass@some-name-mongos.demand-backup-sharded-19473 '' '' '' + local 'command=use myApp2\n db.test.insert({ x: 100501 })' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local driver=mongodb + local suffix=.svc.cluster.local ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.snFxsFGhkI +++ mktemp ++ local LAST_ERR=/tmp/tmp.FCCSGbkblz ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.snFxsFGhkI ++ cat /tmp/tmp.FCCSGbkblz ++ rm /tmp/tmp.snFxsFGhkI /tmp/tmp.FCCSGbkblz ++ return 0 + local client_container=psmdb-client-7469665986-r8mgp + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp2\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.Dh2Mb3OdXx ++ mktemp + local LAST_ERR=/tmp/tmp.H4G1t4qK3M + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp2\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.Dh2Mb3OdXx Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-19473.svc.cluster.local:27017/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("d9ba7d90-e6b2-465c-a9b6-7a727e919ba2") } Percona Server for MongoDB server version: v7.0.11-6 WARNING: shell and server versions do not match switched to db myApp2 WriteResult({ "nInserted" : 1 }) bye + cat /tmp/tmp.H4G1t4qK3M + rm /tmp/tmp.Dh2Mb3OdXx /tmp/tmp.H4G1t4qK3M + return 0 + check_data -2nd + local postfix=-2nd ++ seq 0 2 + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-19473 -2nd .svc.cluster.local myApp test + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local postfix=-2nd + local suffix=.svc.cluster.local + local database=myApp + local collection=test + run_mongos 'use myApp\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-19473 mongodb .svc.cluster.local + local 'command=use myApp\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local driver=mongodb + local suffix=.svc.cluster.local + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' +++ mktemp ++ local LAST_OUT=/tmp/tmp.eKkloXIhEd +++ mktemp ++ local LAST_ERR=/tmp/tmp.lUrxnpJCdt ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.eKkloXIhEd ++ cat /tmp/tmp.lUrxnpJCdt ++ rm /tmp/tmp.eKkloXIhEd /tmp/tmp.lUrxnpJCdt ++ return 0 + local client_container=psmdb-client-7469665986-r8mgp + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.dsWL4jSI19 ++ mktemp + local LAST_ERR=/tmp/tmp.cOs5WekoLe + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.dsWL4jSI19 + cat /tmp/tmp.cOs5WekoLe + rm /tmp/tmp.dsWL4jSI19 /tmp/tmp.cOs5WekoLe + return 0 + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/compare/find-2nd.json /tmp/tmp.kUNddeZY37/find-2nd + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-19473 -2nd1 .svc.cluster.local myApp1 test + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local postfix=-2nd1 + local suffix=.svc.cluster.local + local database=myApp1 + local collection=test + run_mongos 'use myApp1\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-19473 mongodb .svc.cluster.local + local 'command=use myApp1\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local driver=mongodb + local suffix=.svc.cluster.local + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.4vuUC8zRIX +++ mktemp ++ local LAST_ERR=/tmp/tmp.AeZFVx8M5w ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.4vuUC8zRIX ++ cat /tmp/tmp.AeZFVx8M5w ++ rm /tmp/tmp.4vuUC8zRIX /tmp/tmp.AeZFVx8M5w ++ return 0 + local client_container=psmdb-client-7469665986-r8mgp + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp1\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.rQmrv8KqCp ++ mktemp + local LAST_ERR=/tmp/tmp.ke7zS2tIOR + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp1\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.rQmrv8KqCp + cat /tmp/tmp.ke7zS2tIOR + rm /tmp/tmp.rQmrv8KqCp /tmp/tmp.ke7zS2tIOR + return 0 + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/compare/find-2nd1.json /tmp/tmp.kUNddeZY37/find-2nd1 + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-19473 -2nd2 .svc.cluster.local myApp2 test + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local postfix=-2nd2 + local suffix=.svc.cluster.local + local database=myApp2 + local collection=test + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + run_mongos 'use myApp2\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-19473 mongodb .svc.cluster.local + local 'command=use myApp2\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local driver=mongodb + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' + local suffix=.svc.cluster.local ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.OfpXIyAZsJ +++ mktemp ++ local LAST_ERR=/tmp/tmp.w4pvSyJQ8J ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.OfpXIyAZsJ ++ cat /tmp/tmp.w4pvSyJQ8J ++ rm /tmp/tmp.OfpXIyAZsJ /tmp/tmp.w4pvSyJQ8J ++ return 0 + local client_container=psmdb-client-7469665986-r8mgp + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp2\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.RFIbZEJQkN ++ mktemp + local LAST_ERR=/tmp/tmp.5Rb3RZSQRr + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp2\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.RFIbZEJQkN + cat /tmp/tmp.5Rb3RZSQRr + rm /tmp/tmp.RFIbZEJQkN /tmp/tmp.5Rb3RZSQRr + return 0 + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/compare/find-2nd2.json /tmp/tmp.kUNddeZY37/find-2nd2 + run_restore backup-gcp-cs + local backup_name=backup-gcp-cs + /usr/bin/sed -e 's/name:/name: restore-backup-gcp-cs/' + /usr/bin/sed -e 's/backupName:/backupName: backup-gcp-cs/' + cat /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/conf/restore.yml + kubectl_bin apply -f - ++ mktemp + local LAST_OUT=/tmp/tmp.b4Ie3GR6jV ++ mktemp + local LAST_ERR=/tmp/tmp.IhM16hr7yK + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.b4Ie3GR6jV perconaservermongodbrestore.psmdb.percona.com/restore-backup-gcp-cs created + cat /tmp/tmp.IhM16hr7yK + rm /tmp/tmp.b4Ie3GR6jV /tmp/tmp.IhM16hr7yK + return 0 + wait_restore backup-gcp-cs some-name + local backup_name=backup-gcp-cs + local cluster_name=some-name + local target_state=ready + local wait_cluster_consistency=1 + local wait_time=780 + set +o xtrace waiting psmdb-restore/backup-gcp-cs to reach ready state.............. + '[' 1 -eq 1 ']' + wait_cluster_consistency some-name + local cluster_name=some-name + local wait_time=32 + retry=0 + sleep 7 + echo -n 'waiting for cluster readyness' waiting for cluster readyness++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.patIAyB2OJ +++ mktemp ++ local LAST_ERR=/tmp/tmp.2KFFQf6155 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.patIAyB2OJ ++ cat /tmp/tmp.2KFFQf6155 ++ rm /tmp/tmp.patIAyB2OJ /tmp/tmp.2KFFQf6155 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 1 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.r6qVY2rC4Y +++ mktemp ++ local LAST_ERR=/tmp/tmp.q6WMOFSnAZ ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.r6qVY2rC4Y ++ cat /tmp/tmp.q6WMOFSnAZ ++ rm /tmp/tmp.r6qVY2rC4Y /tmp/tmp.q6WMOFSnAZ ++ return 0 + [[ error == \r\e\a\d\y ]] + let retry+=1 + '[' 2 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.o5iAvgb2aM +++ mktemp ++ local LAST_ERR=/tmp/tmp.BQUSkObKnk ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.o5iAvgb2aM ++ cat /tmp/tmp.BQUSkObKnk ++ rm /tmp/tmp.o5iAvgb2aM /tmp/tmp.BQUSkObKnk ++ return 0 + [[ error == \r\e\a\d\y ]] + let retry+=1 + '[' 3 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.R6Eb8TrsgS +++ mktemp ++ local LAST_ERR=/tmp/tmp.bqajv1mAMs ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.R6Eb8TrsgS ++ cat /tmp/tmp.bqajv1mAMs ++ rm /tmp/tmp.R6Eb8TrsgS /tmp/tmp.bqajv1mAMs ++ return 0 + [[ error == \r\e\a\d\y ]] + let retry+=1 + '[' 4 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.iVnbSrKmA6 +++ mktemp ++ local LAST_ERR=/tmp/tmp.MUslWLaQKH ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.iVnbSrKmA6 ++ cat /tmp/tmp.MUslWLaQKH ++ rm /tmp/tmp.iVnbSrKmA6 /tmp/tmp.MUslWLaQKH ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 5 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.FoK7Fp0FZ0 +++ mktemp ++ local LAST_ERR=/tmp/tmp.jDGFqfsaFt ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.FoK7Fp0FZ0 ++ cat /tmp/tmp.jDGFqfsaFt ++ rm /tmp/tmp.FoK7Fp0FZ0 /tmp/tmp.jDGFqfsaFt ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 6 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.lw7ORRENkG +++ mktemp ++ local LAST_ERR=/tmp/tmp.g2MKt2rZBv ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.lw7ORRENkG ++ cat /tmp/tmp.g2MKt2rZBv ++ rm /tmp/tmp.lw7ORRENkG /tmp/tmp.g2MKt2rZBv ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 7 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Tzntw5c1rW +++ mktemp ++ local LAST_ERR=/tmp/tmp.ZlPKZZyOU4 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.Tzntw5c1rW ++ cat /tmp/tmp.ZlPKZZyOU4 ++ rm /tmp/tmp.Tzntw5c1rW /tmp/tmp.ZlPKZZyOU4 ++ return 0 + [[ ready == \r\e\a\d\y ]] + check_data + local postfix= ++ seq 0 2 + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-19473 '' .svc.cluster.local myApp test + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local postfix= + local suffix=.svc.cluster.local + local database=myApp + local collection=test + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' + run_mongos 'use myApp\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-19473 mongodb .svc.cluster.local + local 'command=use myApp\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local driver=mongodb + local suffix=.svc.cluster.local ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.8SeG5qcyyu +++ mktemp ++ local LAST_ERR=/tmp/tmp.fPVUJNot7P ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.8SeG5qcyyu ++ cat /tmp/tmp.fPVUJNot7P ++ rm /tmp/tmp.8SeG5qcyyu /tmp/tmp.fPVUJNot7P ++ return 0 + local client_container=psmdb-client-7469665986-r8mgp + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.adqWWISJya ++ mktemp + local LAST_ERR=/tmp/tmp.R4jTByhJGQ + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.adqWWISJya + cat /tmp/tmp.R4jTByhJGQ + rm /tmp/tmp.adqWWISJya /tmp/tmp.R4jTByhJGQ + return 0 + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/compare/find.json /tmp/tmp.kUNddeZY37/find + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-19473 1 .svc.cluster.local myApp1 test + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local postfix=1 + local suffix=.svc.cluster.local + local database=myApp1 + local collection=test + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' + run_mongos 'use myApp1\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-19473 mongodb .svc.cluster.local + local 'command=use myApp1\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local driver=mongodb + local suffix=.svc.cluster.local ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.32KK4panC8 +++ mktemp ++ local LAST_ERR=/tmp/tmp.5mf2JyP6xV ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.32KK4panC8 ++ cat /tmp/tmp.5mf2JyP6xV ++ rm /tmp/tmp.32KK4panC8 /tmp/tmp.5mf2JyP6xV ++ return 0 + local client_container=psmdb-client-7469665986-r8mgp + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp1\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.WyoxkZVEDv ++ mktemp + local LAST_ERR=/tmp/tmp.dzh0Eq7bIh + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp1\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.WyoxkZVEDv + cat /tmp/tmp.dzh0Eq7bIh + rm /tmp/tmp.WyoxkZVEDv /tmp/tmp.dzh0Eq7bIh + return 0 + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/compare/find1.json /tmp/tmp.kUNddeZY37/find1 + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-19473 2 .svc.cluster.local myApp2 test + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local postfix=2 + local suffix=.svc.cluster.local + local database=myApp2 + local collection=test + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' + run_mongos 'use myApp2\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-19473 mongodb .svc.cluster.local + local 'command=use myApp2\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local driver=mongodb + local suffix=.svc.cluster.local ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.dv2SnLvCGo +++ mktemp ++ local LAST_ERR=/tmp/tmp.SxcCzDTN2q ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.dv2SnLvCGo ++ cat /tmp/tmp.SxcCzDTN2q ++ rm /tmp/tmp.dv2SnLvCGo /tmp/tmp.SxcCzDTN2q ++ return 0 + local client_container=psmdb-client-7469665986-r8mgp + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp2\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.h1DYVAZ5MO ++ mktemp + local LAST_ERR=/tmp/tmp.kvCb8Zdx6q + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp2\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.h1DYVAZ5MO + cat /tmp/tmp.kvCb8Zdx6q + rm /tmp/tmp.h1DYVAZ5MO /tmp/tmp.kvCb8Zdx6q + return 0 + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/compare/find2.json /tmp/tmp.kUNddeZY37/find2 + desc 'check backup and restore -- azure-blob' + set +o xtrace ----------------------------------------------------------------------------------- check backup and restore -- azure-blob ----------------------------------------------------------------------------------- ++ get_backup_dest backup-azure-blob ++ local backup_name=backup-azure-blob ++ kubectl_bin get psmdb-backup backup-azure-blob -o 'jsonpath={.status.destination}' ++ sed -e 's/.json$//' ++ sed 's|s3://||' +++ mktemp ++ sed 's|azure://||' ++ local LAST_OUT=/tmp/tmp.EqQe0RH1ZD +++ mktemp ++ local LAST_ERR=/tmp/tmp.vFFmMCbB5b ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb-backup backup-azure-blob -o 'jsonpath={.status.destination}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.EqQe0RH1ZD ++ cat /tmp/tmp.vFFmMCbB5b ++ rm /tmp/tmp.EqQe0RH1ZD /tmp/tmp.vFFmMCbB5b ++ return 0 + backup_dest_azure=operator-testing/psmdb-demand-backup-sharded/2024-06-04T15:13:41Z + curl -s https://engk8soperators.blob.core.windows.net/operator-testing/psmdb-demand-backup-sharded/2024-06-04T15:13:41Z/rs0/myApp.test.gz + gunzip + curl -s https://engk8soperators.blob.core.windows.net/operator-testing/psmdb-demand-backup-sharded/2024-06-04T15:13:41Z/rs1/myApp1.test.gz + gunzip + gunzip + curl -s https://engk8soperators.blob.core.windows.net/operator-testing/psmdb-demand-backup-sharded/2024-06-04T15:13:41Z/rs2/myApp2.test.gz + insert_data_mongos 100501 myApp + local data=100501 + local db_name=myApp + local flags= + run_mongos 'use myApp\n db.test.insert({ x: 100501 })' myApp:myPass@some-name-mongos.demand-backup-sharded-19473 '' '' '' + local 'command=use myApp\n db.test.insert({ x: 100501 })' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local driver=mongodb + local suffix=.svc.cluster.local ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.eULv7H76iq +++ mktemp ++ local LAST_ERR=/tmp/tmp.kzpm4xb227 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.eULv7H76iq ++ cat /tmp/tmp.kzpm4xb227 ++ rm /tmp/tmp.eULv7H76iq /tmp/tmp.kzpm4xb227 ++ return 0 + local client_container=psmdb-client-7469665986-r8mgp + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.w9ipPvODKv ++ mktemp + local LAST_ERR=/tmp/tmp.KRTtn1xZGW + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.w9ipPvODKv Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-19473.svc.cluster.local:27017/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("c56e9d3e-e98a-4d86-b438-28cbe56d515c") } Percona Server for MongoDB server version: v7.0.11-6 WARNING: shell and server versions do not match switched to db myApp WriteResult({ "nInserted" : 1 }) bye + cat /tmp/tmp.KRTtn1xZGW + rm /tmp/tmp.w9ipPvODKv /tmp/tmp.KRTtn1xZGW + return 0 + insert_data_mongos 100501 myApp1 + local data=100501 + local db_name=myApp1 + local flags= + run_mongos 'use myApp1\n db.test.insert({ x: 100501 })' myApp:myPass@some-name-mongos.demand-backup-sharded-19473 '' '' '' + local 'command=use myApp1\n db.test.insert({ x: 100501 })' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local driver=mongodb + local suffix=.svc.cluster.local ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.vV34l1RLjJ +++ mktemp ++ local LAST_ERR=/tmp/tmp.qkRtakPfKs ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.vV34l1RLjJ ++ cat /tmp/tmp.qkRtakPfKs ++ rm /tmp/tmp.vV34l1RLjJ /tmp/tmp.qkRtakPfKs ++ return 0 + local client_container=psmdb-client-7469665986-r8mgp + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp1\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.WCh2CwLGhr ++ mktemp + local LAST_ERR=/tmp/tmp.T41mEHd6xp + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp1\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.WCh2CwLGhr Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-19473.svc.cluster.local:27017/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("5f362277-4574-44cd-b9b3-384ed6dc346d") } Percona Server for MongoDB server version: v7.0.11-6 WARNING: shell and server versions do not match switched to db myApp1 WriteResult({ "nInserted" : 1 }) bye + cat /tmp/tmp.T41mEHd6xp + rm /tmp/tmp.WCh2CwLGhr /tmp/tmp.T41mEHd6xp + return 0 + insert_data_mongos 100501 myApp2 + local data=100501 + local db_name=myApp2 + local flags= + run_mongos 'use myApp2\n db.test.insert({ x: 100501 })' myApp:myPass@some-name-mongos.demand-backup-sharded-19473 '' '' '' + local 'command=use myApp2\n db.test.insert({ x: 100501 })' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local driver=mongodb + local suffix=.svc.cluster.local ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Ug3lqaPbVX +++ mktemp ++ local LAST_ERR=/tmp/tmp.8NHUjEsujl ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.Ug3lqaPbVX ++ cat /tmp/tmp.8NHUjEsujl ++ rm /tmp/tmp.Ug3lqaPbVX /tmp/tmp.8NHUjEsujl ++ return 0 + local client_container=psmdb-client-7469665986-r8mgp + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp2\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.aI6PsG1HqM ++ mktemp + local LAST_ERR=/tmp/tmp.2Pbputwf68 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp2\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.aI6PsG1HqM Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-19473.svc.cluster.local:27017/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("1d806441-ceb6-4d0e-b311-1ae8fde35dd3") } Percona Server for MongoDB server version: v7.0.11-6 WARNING: shell and server versions do not match switched to db myApp2 WriteResult({ "nInserted" : 1 }) bye + cat /tmp/tmp.2Pbputwf68 + rm /tmp/tmp.aI6PsG1HqM /tmp/tmp.2Pbputwf68 + return 0 + check_data -2nd + local postfix=-2nd ++ seq 0 2 + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-19473 -2nd .svc.cluster.local myApp test + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local postfix=-2nd + local suffix=.svc.cluster.local + local database=myApp + local collection=test + run_mongos 'use myApp\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-19473 mongodb .svc.cluster.local + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + local 'command=use myApp\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local driver=mongodb + local suffix=.svc.cluster.local + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.SDRhKL2eQF +++ mktemp ++ local LAST_ERR=/tmp/tmp.JFZpgUXhHp ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.SDRhKL2eQF ++ cat /tmp/tmp.JFZpgUXhHp ++ rm /tmp/tmp.SDRhKL2eQF /tmp/tmp.JFZpgUXhHp ++ return 0 + local client_container=psmdb-client-7469665986-r8mgp + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.GdcnlJTmSM ++ mktemp + local LAST_ERR=/tmp/tmp.wylQ31s1yb + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.GdcnlJTmSM + cat /tmp/tmp.wylQ31s1yb + rm /tmp/tmp.GdcnlJTmSM /tmp/tmp.wylQ31s1yb + return 0 + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/compare/find-2nd.json /tmp/tmp.kUNddeZY37/find-2nd + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-19473 -2nd1 .svc.cluster.local myApp1 test + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local postfix=-2nd1 + local suffix=.svc.cluster.local + local database=myApp1 + local collection=test + run_mongos 'use myApp1\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-19473 mongodb .svc.cluster.local + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + local 'command=use myApp1\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local driver=mongodb + local suffix=.svc.cluster.local + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.3DWj8pCuqd +++ mktemp ++ local LAST_ERR=/tmp/tmp.YJmnkHB9Nc ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.3DWj8pCuqd ++ cat /tmp/tmp.YJmnkHB9Nc ++ rm /tmp/tmp.3DWj8pCuqd /tmp/tmp.YJmnkHB9Nc ++ return 0 + local client_container=psmdb-client-7469665986-r8mgp + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp1\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.oF6gKy0PZF ++ mktemp + local LAST_ERR=/tmp/tmp.cRY9apL4vG + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp1\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.oF6gKy0PZF + cat /tmp/tmp.cRY9apL4vG + rm /tmp/tmp.oF6gKy0PZF /tmp/tmp.cRY9apL4vG + return 0 + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/compare/find-2nd1.json /tmp/tmp.kUNddeZY37/find-2nd1 + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-19473 -2nd2 .svc.cluster.local myApp2 test + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local postfix=-2nd2 + local suffix=.svc.cluster.local + local database=myApp2 + local collection=test + run_mongos 'use myApp2\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-19473 mongodb .svc.cluster.local + local 'command=use myApp2\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local driver=mongodb + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + local suffix=.svc.cluster.local + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.fm531WMEYr +++ mktemp ++ local LAST_ERR=/tmp/tmp.AAo5WIurJ9 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.fm531WMEYr ++ cat /tmp/tmp.AAo5WIurJ9 ++ rm /tmp/tmp.fm531WMEYr /tmp/tmp.AAo5WIurJ9 ++ return 0 + local client_container=psmdb-client-7469665986-r8mgp + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp2\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.XjZt7dWwMQ ++ mktemp + local LAST_ERR=/tmp/tmp.Ijc5jNMkmy + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp2\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.XjZt7dWwMQ + cat /tmp/tmp.Ijc5jNMkmy + rm /tmp/tmp.XjZt7dWwMQ /tmp/tmp.Ijc5jNMkmy + return 0 + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/compare/find-2nd2.json /tmp/tmp.kUNddeZY37/find-2nd2 + run_restore backup-azure-blob + local backup_name=backup-azure-blob + /usr/bin/sed -e 's/name:/name: restore-backup-azure-blob/' + /usr/bin/sed -e 's/backupName:/backupName: backup-azure-blob/' + cat /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/conf/restore.yml + kubectl_bin apply -f - ++ mktemp + local LAST_OUT=/tmp/tmp.4iqxJqh4ep ++ mktemp + local LAST_ERR=/tmp/tmp.52ha9NUN3f + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.4iqxJqh4ep perconaservermongodbrestore.psmdb.percona.com/restore-backup-azure-blob created + cat /tmp/tmp.52ha9NUN3f + rm /tmp/tmp.4iqxJqh4ep /tmp/tmp.52ha9NUN3f + return 0 + wait_restore backup-azure-blob some-name + local backup_name=backup-azure-blob + local cluster_name=some-name + local target_state=ready + local wait_cluster_consistency=1 + local wait_time=780 + set +o xtrace waiting psmdb-restore/backup-azure-blob to reach ready state............... + '[' 1 -eq 1 ']' + wait_cluster_consistency some-name + local cluster_name=some-name + local wait_time=32 + retry=0 + sleep 7 + echo -n 'waiting for cluster readyness' waiting for cluster readyness++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.wxRaMOaqnd +++ mktemp ++ local LAST_ERR=/tmp/tmp.pHFyIr9e3W ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.wxRaMOaqnd ++ cat /tmp/tmp.pHFyIr9e3W ++ rm /tmp/tmp.wxRaMOaqnd /tmp/tmp.pHFyIr9e3W ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 1 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.hiOI5qAUb6 +++ mktemp ++ local LAST_ERR=/tmp/tmp.Atrs5YARyV ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.hiOI5qAUb6 ++ cat /tmp/tmp.Atrs5YARyV ++ rm /tmp/tmp.hiOI5qAUb6 /tmp/tmp.Atrs5YARyV ++ return 0 + [[ error == \r\e\a\d\y ]] + let retry+=1 + '[' 2 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.lXWvHQ1B2w +++ mktemp ++ local LAST_ERR=/tmp/tmp.S2cgoYNXqO ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.lXWvHQ1B2w ++ cat /tmp/tmp.S2cgoYNXqO ++ rm /tmp/tmp.lXWvHQ1B2w /tmp/tmp.S2cgoYNXqO ++ return 0 + [[ error == \r\e\a\d\y ]] + let retry+=1 + '[' 3 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.sntmP6F5Bi +++ mktemp ++ local LAST_ERR=/tmp/tmp.tgAzABibnV ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.sntmP6F5Bi ++ cat /tmp/tmp.tgAzABibnV ++ rm /tmp/tmp.sntmP6F5Bi /tmp/tmp.tgAzABibnV ++ return 0 + [[ error == \r\e\a\d\y ]] + let retry+=1 + '[' 4 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Ydt9z41iah +++ mktemp ++ local LAST_ERR=/tmp/tmp.UcP5kzqMm0 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.Ydt9z41iah ++ cat /tmp/tmp.UcP5kzqMm0 ++ rm /tmp/tmp.Ydt9z41iah /tmp/tmp.UcP5kzqMm0 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 5 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.GuJJnKtizg +++ mktemp ++ local LAST_ERR=/tmp/tmp.RieL1u0q94 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.GuJJnKtizg ++ cat /tmp/tmp.RieL1u0q94 ++ rm /tmp/tmp.GuJJnKtizg /tmp/tmp.RieL1u0q94 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 6 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.rk7CXg35HC +++ mktemp ++ local LAST_ERR=/tmp/tmp.pyFrACPuea ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.rk7CXg35HC ++ cat /tmp/tmp.pyFrACPuea ++ rm /tmp/tmp.rk7CXg35HC /tmp/tmp.pyFrACPuea ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 7 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.sJ6iKaCHzd +++ mktemp ++ local LAST_ERR=/tmp/tmp.w5vR7PrRgG ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.sJ6iKaCHzd ++ cat /tmp/tmp.w5vR7PrRgG ++ rm /tmp/tmp.sJ6iKaCHzd /tmp/tmp.w5vR7PrRgG ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 8 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.TEEgZRHABb +++ mktemp ++ local LAST_ERR=/tmp/tmp.SPHyW1YZf6 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.TEEgZRHABb ++ cat /tmp/tmp.SPHyW1YZf6 ++ rm /tmp/tmp.TEEgZRHABb /tmp/tmp.SPHyW1YZf6 ++ return 0 + [[ ready == \r\e\a\d\y ]] + check_data + local postfix= ++ seq 0 2 + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-19473 '' .svc.cluster.local myApp test + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local postfix= + local suffix=.svc.cluster.local + local database=myApp + local collection=test + run_mongos 'use myApp\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-19473 mongodb .svc.cluster.local + local 'command=use myApp\n db.test.find()' + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local driver=mongodb + local suffix=.svc.cluster.local + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.PoZkliEjmT +++ mktemp ++ local LAST_ERR=/tmp/tmp.DWmc4bk5Ou ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.PoZkliEjmT ++ cat /tmp/tmp.DWmc4bk5Ou ++ rm /tmp/tmp.PoZkliEjmT /tmp/tmp.DWmc4bk5Ou ++ return 0 + local client_container=psmdb-client-7469665986-r8mgp + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.UtELO3Jj6E ++ mktemp + local LAST_ERR=/tmp/tmp.1oxQl51kNJ + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.UtELO3Jj6E + cat /tmp/tmp.1oxQl51kNJ + rm /tmp/tmp.UtELO3Jj6E /tmp/tmp.1oxQl51kNJ + return 0 + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/compare/find.json /tmp/tmp.kUNddeZY37/find + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-19473 1 .svc.cluster.local myApp1 test + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local postfix=1 + local suffix=.svc.cluster.local + local database=myApp1 + local collection=test + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' + run_mongos 'use myApp1\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-19473 mongodb .svc.cluster.local + local 'command=use myApp1\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local driver=mongodb + local suffix=.svc.cluster.local ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Syl1ASh1W5 +++ mktemp ++ local LAST_ERR=/tmp/tmp.rNUVOYQS8N ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.Syl1ASh1W5 ++ cat /tmp/tmp.rNUVOYQS8N ++ rm /tmp/tmp.Syl1ASh1W5 /tmp/tmp.rNUVOYQS8N ++ return 0 + local client_container=psmdb-client-7469665986-r8mgp + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp1\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.86AcwG5FGs ++ mktemp + local LAST_ERR=/tmp/tmp.wW5HNiZSJh + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp1\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.86AcwG5FGs + cat /tmp/tmp.wW5HNiZSJh + rm /tmp/tmp.86AcwG5FGs /tmp/tmp.wW5HNiZSJh + return 0 + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/compare/find1.json /tmp/tmp.kUNddeZY37/find1 + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-19473 2 .svc.cluster.local myApp2 test + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local postfix=2 + local suffix=.svc.cluster.local + local database=myApp2 + local collection=test + run_mongos 'use myApp2\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-19473 mongodb .svc.cluster.local + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + local 'command=use myApp2\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local driver=mongodb + local suffix=.svc.cluster.local + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.yE2McDrw0i +++ mktemp ++ local LAST_ERR=/tmp/tmp.JiHBXG1rhE ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.yE2McDrw0i ++ cat /tmp/tmp.JiHBXG1rhE ++ rm /tmp/tmp.yE2McDrw0i /tmp/tmp.JiHBXG1rhE ++ return 0 + local client_container=psmdb-client-7469665986-r8mgp + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp2\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.CScii1h1TX ++ mktemp + local LAST_ERR=/tmp/tmp.Gpasw1WYZn + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp2\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.CScii1h1TX + cat /tmp/tmp.Gpasw1WYZn + rm /tmp/tmp.CScii1h1TX /tmp/tmp.Gpasw1WYZn + return 0 + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/compare/find2.json /tmp/tmp.kUNddeZY37/find2 + desc 'check backup and restore -- minio' + set +o xtrace ----------------------------------------------------------------------------------- check backup and restore -- minio ----------------------------------------------------------------------------------- ++ get_backup_dest backup-minio ++ local backup_name=backup-minio ++ kubectl_bin get psmdb-backup backup-minio -o 'jsonpath={.status.destination}' ++ sed -e 's/.json$//' ++ sed 's|s3://||' ++ sed 's|azure://||' +++ mktemp ++ local LAST_OUT=/tmp/tmp.GNfHyE4HvC +++ mktemp ++ local LAST_ERR=/tmp/tmp.52oLa7gTtW ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb-backup backup-minio -o 'jsonpath={.status.destination}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.GNfHyE4HvC ++ cat /tmp/tmp.52oLa7gTtW ++ rm /tmp/tmp.GNfHyE4HvC /tmp/tmp.52oLa7gTtW ++ return 0 + backup_dest_minio=operator-testing/2024-06-04T15:11:28Z + grep myApp.test.gz + kubectl_bin run -i --rm aws-cli --image=perconalab/awscli --restart=Never -- /usr/bin/env AWS_ACCESS_KEY_ID=some-access-key AWS_SECRET_ACCESS_KEY=some-secret-key AWS_DEFAULT_REGION=us-east-1 /usr/bin/aws --endpoint-url http://minio-service:9000 s3 ls s3://operator-testing/2024-06-04T15:11:28Z/rs0/ ++ mktemp + local LAST_OUT=/tmp/tmp.pV4Oxgfosm ++ mktemp + local LAST_ERR=/tmp/tmp.VZiGUqoLaK + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl run -i --rm aws-cli --image=perconalab/awscli --restart=Never -- /usr/bin/env AWS_ACCESS_KEY_ID=some-access-key AWS_SECRET_ACCESS_KEY=some-secret-key AWS_DEFAULT_REGION=us-east-1 /usr/bin/aws --endpoint-url http://minio-service:9000 s3 ls s3://operator-testing/2024-06-04T15:11:28Z/rs0/ + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.pV4Oxgfosm + cat /tmp/tmp.VZiGUqoLaK If you don't see a command prompt, try pressing enter. warning: couldn't attach to pod/aws-cli, falling back to streaming logs: unable to upgrade connection: container aws-cli not found in pod aws-cli_demand-backup-sharded-19473 + rm /tmp/tmp.pV4Oxgfosm /tmp/tmp.VZiGUqoLaK + return 0 2024-06-04 15:11:32 55 myApp.test.gz + insert_data_mongos 100501 myApp + local data=100501 + local db_name=myApp + local flags= + run_mongos 'use myApp\n db.test.insert({ x: 100501 })' myApp:myPass@some-name-mongos.demand-backup-sharded-19473 '' '' '' + local 'command=use myApp\n db.test.insert({ x: 100501 })' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local driver=mongodb + local suffix=.svc.cluster.local ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.yfYmUplGEJ +++ mktemp ++ local LAST_ERR=/tmp/tmp.Zh0iU6cRE3 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.yfYmUplGEJ ++ cat /tmp/tmp.Zh0iU6cRE3 ++ rm /tmp/tmp.yfYmUplGEJ /tmp/tmp.Zh0iU6cRE3 ++ return 0 + local client_container=psmdb-client-7469665986-r8mgp + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.TSnYGseq2q ++ mktemp + local LAST_ERR=/tmp/tmp.5KqNbnOJ6t + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.TSnYGseq2q Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-19473.svc.cluster.local:27017/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("568e8b05-9fb2-4c1a-808c-2d58254753f9") } Percona Server for MongoDB server version: v7.0.11-6 WARNING: shell and server versions do not match switched to db myApp WriteResult({ "nInserted" : 1 }) bye + cat /tmp/tmp.5KqNbnOJ6t + rm /tmp/tmp.TSnYGseq2q /tmp/tmp.5KqNbnOJ6t + return 0 + insert_data_mongos 100501 myApp1 + local data=100501 + local db_name=myApp1 + local flags= + run_mongos 'use myApp1\n db.test.insert({ x: 100501 })' myApp:myPass@some-name-mongos.demand-backup-sharded-19473 '' '' '' + local 'command=use myApp1\n db.test.insert({ x: 100501 })' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local driver=mongodb + local suffix=.svc.cluster.local ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.qZ6cz6FL5n +++ mktemp ++ local LAST_ERR=/tmp/tmp.OgvW5FbL58 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.qZ6cz6FL5n ++ cat /tmp/tmp.OgvW5FbL58 ++ rm /tmp/tmp.qZ6cz6FL5n /tmp/tmp.OgvW5FbL58 ++ return 0 + local client_container=psmdb-client-7469665986-r8mgp + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp1\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.lxg3KecvV5 ++ mktemp + local LAST_ERR=/tmp/tmp.9kUiknVCIl + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp1\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.lxg3KecvV5 Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-19473.svc.cluster.local:27017/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("a3fcc142-8e9a-4e81-96a4-ce43c07ca5b6") } Percona Server for MongoDB server version: v7.0.11-6 WARNING: shell and server versions do not match switched to db myApp1 WriteResult({ "nInserted" : 1 }) bye + cat /tmp/tmp.9kUiknVCIl + rm /tmp/tmp.lxg3KecvV5 /tmp/tmp.9kUiknVCIl + return 0 + insert_data_mongos 100501 myApp2 + local data=100501 + local db_name=myApp2 + local flags= + run_mongos 'use myApp2\n db.test.insert({ x: 100501 })' myApp:myPass@some-name-mongos.demand-backup-sharded-19473 '' '' '' + local 'command=use myApp2\n db.test.insert({ x: 100501 })' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local driver=mongodb + local suffix=.svc.cluster.local ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ISpjkJL0gf +++ mktemp ++ local LAST_ERR=/tmp/tmp.BZ0hapnhrB ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.ISpjkJL0gf ++ cat /tmp/tmp.BZ0hapnhrB ++ rm /tmp/tmp.ISpjkJL0gf /tmp/tmp.BZ0hapnhrB ++ return 0 + local client_container=psmdb-client-7469665986-r8mgp + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp2\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.ALN6huXyuO ++ mktemp + local LAST_ERR=/tmp/tmp.WTHNQsf4Tw + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp2\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.ALN6huXyuO Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-19473.svc.cluster.local:27017/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("42d56ec1-3826-4d10-a838-4953991e82f9") } Percona Server for MongoDB server version: v7.0.11-6 WARNING: shell and server versions do not match switched to db myApp2 WriteResult({ "nInserted" : 1 }) bye + cat /tmp/tmp.WTHNQsf4Tw + rm /tmp/tmp.ALN6huXyuO /tmp/tmp.WTHNQsf4Tw + return 0 + check_data -2nd + local postfix=-2nd ++ seq 0 2 + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-19473 -2nd .svc.cluster.local myApp test + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local postfix=-2nd + local suffix=.svc.cluster.local + local database=myApp + local collection=test + run_mongos 'use myApp\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-19473 mongodb .svc.cluster.local + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + local 'command=use myApp\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local driver=mongodb + local suffix=.svc.cluster.local + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.MNW0CQ1jXJ +++ mktemp ++ local LAST_ERR=/tmp/tmp.qVoAqiXwrM ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.MNW0CQ1jXJ ++ cat /tmp/tmp.qVoAqiXwrM ++ rm /tmp/tmp.MNW0CQ1jXJ /tmp/tmp.qVoAqiXwrM ++ return 0 + local client_container=psmdb-client-7469665986-r8mgp + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.J1rWp9yE9t ++ mktemp + local LAST_ERR=/tmp/tmp.90djUWrX4e + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.J1rWp9yE9t + cat /tmp/tmp.90djUWrX4e + rm /tmp/tmp.J1rWp9yE9t /tmp/tmp.90djUWrX4e + return 0 + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/compare/find-2nd.json /tmp/tmp.kUNddeZY37/find-2nd + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-19473 -2nd1 .svc.cluster.local myApp1 test + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local postfix=-2nd1 + local suffix=.svc.cluster.local + local database=myApp1 + local collection=test + run_mongos 'use myApp1\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-19473 mongodb .svc.cluster.local + local 'command=use myApp1\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local driver=mongodb + local suffix=.svc.cluster.local + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.rV1pqY840g +++ mktemp ++ local LAST_ERR=/tmp/tmp.eb1iBkaKyn ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.rV1pqY840g ++ cat /tmp/tmp.eb1iBkaKyn ++ rm /tmp/tmp.rV1pqY840g /tmp/tmp.eb1iBkaKyn ++ return 0 + local client_container=psmdb-client-7469665986-r8mgp + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp1\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.lTf3DXnMIW ++ mktemp + local LAST_ERR=/tmp/tmp.YgY1Nq8doG + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp1\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.lTf3DXnMIW + cat /tmp/tmp.YgY1Nq8doG + rm /tmp/tmp.lTf3DXnMIW /tmp/tmp.YgY1Nq8doG + return 0 + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/compare/find-2nd1.json /tmp/tmp.kUNddeZY37/find-2nd1 + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-19473 -2nd2 .svc.cluster.local myApp2 test + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local postfix=-2nd2 + local suffix=.svc.cluster.local + local database=myApp2 + local collection=test + run_mongos 'use myApp2\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-19473 mongodb .svc.cluster.local + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + local 'command=use myApp2\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local driver=mongodb + local suffix=.svc.cluster.local + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.aoWVugmtRd +++ mktemp ++ local LAST_ERR=/tmp/tmp.pZWsq4zJ4r ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.aoWVugmtRd ++ cat /tmp/tmp.pZWsq4zJ4r ++ rm /tmp/tmp.aoWVugmtRd /tmp/tmp.pZWsq4zJ4r ++ return 0 + local client_container=psmdb-client-7469665986-r8mgp + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp2\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.LrrLfKgvbZ ++ mktemp + local LAST_ERR=/tmp/tmp.Nnu6dRqDuk + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp2\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.LrrLfKgvbZ + cat /tmp/tmp.Nnu6dRqDuk + rm /tmp/tmp.LrrLfKgvbZ /tmp/tmp.Nnu6dRqDuk + return 0 + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/compare/find-2nd2.json /tmp/tmp.kUNddeZY37/find-2nd2 + run_restore backup-minio + local backup_name=backup-minio + /usr/bin/sed -e 's/name:/name: restore-backup-minio/' + /usr/bin/sed -e 's/backupName:/backupName: backup-minio/' + kubectl_bin apply -f - + cat /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/conf/restore.yml ++ mktemp + local LAST_OUT=/tmp/tmp.q7g9bF48MK ++ mktemp + local LAST_ERR=/tmp/tmp.sEHVuZb5pH + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.q7g9bF48MK perconaservermongodbrestore.psmdb.percona.com/restore-backup-minio created + cat /tmp/tmp.sEHVuZb5pH + rm /tmp/tmp.q7g9bF48MK /tmp/tmp.sEHVuZb5pH + return 0 + wait_restore backup-minio some-name + local backup_name=backup-minio + local cluster_name=some-name + local target_state=ready + local wait_cluster_consistency=1 + local wait_time=780 + set +o xtrace waiting psmdb-restore/backup-minio to reach ready state............. + '[' 1 -eq 1 ']' + wait_cluster_consistency some-name + local cluster_name=some-name + local wait_time=32 + retry=0 + sleep 7 + echo -n 'waiting for cluster readyness' waiting for cluster readyness++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ApXqy5vpWx +++ mktemp ++ local LAST_ERR=/tmp/tmp.hdsGkVEjon ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.ApXqy5vpWx ++ cat /tmp/tmp.hdsGkVEjon ++ rm /tmp/tmp.ApXqy5vpWx /tmp/tmp.hdsGkVEjon ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 1 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.37FugCom1C +++ mktemp ++ local LAST_ERR=/tmp/tmp.0G638WN5uW ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.37FugCom1C ++ cat /tmp/tmp.0G638WN5uW ++ rm /tmp/tmp.37FugCom1C /tmp/tmp.0G638WN5uW ++ return 0 + [[ error == \r\e\a\d\y ]] + let retry+=1 + '[' 2 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.cBamjihKRC +++ mktemp ++ local LAST_ERR=/tmp/tmp.ycTaR6araz ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.cBamjihKRC ++ cat /tmp/tmp.ycTaR6araz ++ rm /tmp/tmp.cBamjihKRC /tmp/tmp.ycTaR6araz ++ return 0 + [[ error == \r\e\a\d\y ]] + let retry+=1 + '[' 3 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.EgP4X5qq1T +++ mktemp ++ local LAST_ERR=/tmp/tmp.aqPd0lQhRf ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.EgP4X5qq1T ++ cat /tmp/tmp.aqPd0lQhRf ++ rm /tmp/tmp.EgP4X5qq1T /tmp/tmp.aqPd0lQhRf ++ return 0 + [[ error == \r\e\a\d\y ]] + let retry+=1 + '[' 4 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.OQKQLJFGmP +++ mktemp ++ local LAST_ERR=/tmp/tmp.sHIkdPa4BV ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.OQKQLJFGmP ++ cat /tmp/tmp.sHIkdPa4BV ++ rm /tmp/tmp.OQKQLJFGmP /tmp/tmp.sHIkdPa4BV ++ return 0 + [[ error == \r\e\a\d\y ]] + let retry+=1 + '[' 5 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.fie2V4QAB6 +++ mktemp ++ local LAST_ERR=/tmp/tmp.Rho6pGXhlG ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.fie2V4QAB6 ++ cat /tmp/tmp.Rho6pGXhlG ++ rm /tmp/tmp.fie2V4QAB6 /tmp/tmp.Rho6pGXhlG ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 6 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.NDzLz2IC6h +++ mktemp ++ local LAST_ERR=/tmp/tmp.MdhpUpyOw5 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.NDzLz2IC6h ++ cat /tmp/tmp.MdhpUpyOw5 ++ rm /tmp/tmp.NDzLz2IC6h /tmp/tmp.MdhpUpyOw5 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 7 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.EORRhQh6U0 +++ mktemp ++ local LAST_ERR=/tmp/tmp.sKh2rMyVgc ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.EORRhQh6U0 ++ cat /tmp/tmp.sKh2rMyVgc ++ rm /tmp/tmp.EORRhQh6U0 /tmp/tmp.sKh2rMyVgc ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 8 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.abLxIu8LCi +++ mktemp ++ local LAST_ERR=/tmp/tmp.c1oQ5RJkqf ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.abLxIu8LCi ++ cat /tmp/tmp.c1oQ5RJkqf ++ rm /tmp/tmp.abLxIu8LCi /tmp/tmp.c1oQ5RJkqf ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 9 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.mDN1W2cCK4 +++ mktemp ++ local LAST_ERR=/tmp/tmp.4THtmCzMrC ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.mDN1W2cCK4 ++ cat /tmp/tmp.4THtmCzMrC ++ rm /tmp/tmp.mDN1W2cCK4 /tmp/tmp.4THtmCzMrC ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 10 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.J8IMu9eCzG +++ mktemp ++ local LAST_ERR=/tmp/tmp.teJoPxthuu ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.J8IMu9eCzG ++ cat /tmp/tmp.teJoPxthuu ++ rm /tmp/tmp.J8IMu9eCzG /tmp/tmp.teJoPxthuu ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 11 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.HKJ8zilNl3 +++ mktemp ++ local LAST_ERR=/tmp/tmp.jfRauZVwLE ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.HKJ8zilNl3 ++ cat /tmp/tmp.jfRauZVwLE ++ rm /tmp/tmp.HKJ8zilNl3 /tmp/tmp.jfRauZVwLE ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 12 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.3rBglmxpg3 +++ mktemp ++ local LAST_ERR=/tmp/tmp.Yy64aF9yI5 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.3rBglmxpg3 ++ cat /tmp/tmp.Yy64aF9yI5 ++ rm /tmp/tmp.3rBglmxpg3 /tmp/tmp.Yy64aF9yI5 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 13 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.B1Sr5HDaY1 +++ mktemp ++ local LAST_ERR=/tmp/tmp.o45ImDIUDo ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.B1Sr5HDaY1 ++ cat /tmp/tmp.o45ImDIUDo ++ rm /tmp/tmp.B1Sr5HDaY1 /tmp/tmp.o45ImDIUDo ++ return 0 + [[ ready == \r\e\a\d\y ]] + check_data + local postfix= ++ seq 0 2 + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-19473 '' .svc.cluster.local myApp test + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local postfix= + local suffix=.svc.cluster.local + local database=myApp + local collection=test + run_mongos 'use myApp\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-19473 mongodb .svc.cluster.local + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + local 'command=use myApp\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local driver=mongodb + local suffix=.svc.cluster.local + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.6ubBZlu3kh +++ mktemp ++ local LAST_ERR=/tmp/tmp.KQk71bP2Hx ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.6ubBZlu3kh ++ cat /tmp/tmp.KQk71bP2Hx ++ rm /tmp/tmp.6ubBZlu3kh /tmp/tmp.KQk71bP2Hx ++ return 0 + local client_container=psmdb-client-7469665986-r8mgp + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.D9Rlh7Wzwj ++ mktemp + local LAST_ERR=/tmp/tmp.S0nHxPgna8 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.D9Rlh7Wzwj + cat /tmp/tmp.S0nHxPgna8 + rm /tmp/tmp.D9Rlh7Wzwj /tmp/tmp.S0nHxPgna8 + return 0 + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/compare/find.json /tmp/tmp.kUNddeZY37/find + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-19473 1 .svc.cluster.local myApp1 test + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local postfix=1 + local suffix=.svc.cluster.local + local database=myApp1 + local collection=test + run_mongos 'use myApp1\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-19473 mongodb .svc.cluster.local + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + local 'command=use myApp1\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local driver=mongodb + local suffix=.svc.cluster.local + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.IwJLq1iGa8 +++ mktemp ++ local LAST_ERR=/tmp/tmp.gwuDNPaatA ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.IwJLq1iGa8 ++ cat /tmp/tmp.gwuDNPaatA ++ rm /tmp/tmp.IwJLq1iGa8 /tmp/tmp.gwuDNPaatA ++ return 0 + local client_container=psmdb-client-7469665986-r8mgp + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp1\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.ODOh4M4TO5 ++ mktemp + local LAST_ERR=/tmp/tmp.7Q8CwOby2a + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp1\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.ODOh4M4TO5 + cat /tmp/tmp.7Q8CwOby2a + rm /tmp/tmp.ODOh4M4TO5 /tmp/tmp.7Q8CwOby2a + return 0 + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/compare/find1.json /tmp/tmp.kUNddeZY37/find1 + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-19473 2 .svc.cluster.local myApp2 test + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local postfix=2 + local suffix=.svc.cluster.local + local database=myApp2 + local collection=test + run_mongos 'use myApp2\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-19473 mongodb .svc.cluster.local + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + local 'command=use myApp2\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-19473 + local driver=mongodb + local suffix=.svc.cluster.local + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.mOWO7otGRq +++ mktemp ++ local LAST_ERR=/tmp/tmp.BXfhV3CfeT ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.mOWO7otGRq ++ cat /tmp/tmp.BXfhV3CfeT ++ rm /tmp/tmp.mOWO7otGRq /tmp/tmp.BXfhV3CfeT ++ return 0 + local client_container=psmdb-client-7469665986-r8mgp + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp2\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.OxYERy31pe ++ mktemp + local LAST_ERR=/tmp/tmp.9SDtRQCatG + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-r8mgp -- bash -c 'printf '\''use myApp2\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-19473.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.OxYERy31pe + cat /tmp/tmp.9SDtRQCatG + rm /tmp/tmp.OxYERy31pe /tmp/tmp.9SDtRQCatG + return 0 + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/demand-backup-sharded/compare/find2.json /tmp/tmp.kUNddeZY37/find2 + desc 'delete backup and check if it is removed from bucket -- minio' + set +o xtrace ----------------------------------------------------------------------------------- delete backup and check if it is removed from bucket -- minio ----------------------------------------------------------------------------------- + kubectl_bin delete psmdb-backup --all ++ mktemp + local LAST_OUT=/tmp/tmp.cOexbs68G8 ++ mktemp + local LAST_ERR=/tmp/tmp.tCcEV4dPgA + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete psmdb-backup --all + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.cOexbs68G8 perconaservermongodbbackup.psmdb.percona.com "backup-aws-s3" deleted perconaservermongodbbackup.psmdb.percona.com "backup-azure-blob" deleted perconaservermongodbbackup.psmdb.percona.com "backup-gcp-cs" deleted perconaservermongodbbackup.psmdb.percona.com "backup-minio" deleted + cat /tmp/tmp.tCcEV4dPgA + rm /tmp/tmp.cOexbs68G8 /tmp/tmp.tCcEV4dPgA + return 0 ++ kubectl_bin run -i --rm aws-cli --image=perconalab/awscli --restart=Never -- /usr/bin/env AWS_ACCESS_KEY_ID=some-access-key AWS_SECRET_ACCESS_KEY=some-secret-key AWS_DEFAULT_REGION=us-east-1 /usr/bin/aws --endpoint-url http://minio-service:9000 s3 ls s3://operator-testing/ ++ grep -c operator-testing/2024-06-04T15:11:28Z_ ++ cat +++ mktemp ++ local LAST_OUT=/tmp/tmp.fdF3Uf54sW +++ mktemp ++ local LAST_ERR=/tmp/tmp.Ie8vjpku62 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl run -i --rm aws-cli --image=perconalab/awscli --restart=Never -- /usr/bin/env AWS_ACCESS_KEY_ID=some-access-key AWS_SECRET_ACCESS_KEY=some-secret-key AWS_DEFAULT_REGION=us-east-1 /usr/bin/aws --endpoint-url http://minio-service:9000 s3 ls s3://operator-testing/ ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.fdF3Uf54sW ++ cat /tmp/tmp.Ie8vjpku62 If you don't see a command prompt, try pressing enter. warning: couldn't attach to pod/aws-cli, falling back to streaming logs: unable to upgrade connection: container aws-cli not found in pod aws-cli_demand-backup-sharded-19473 ++ rm /tmp/tmp.fdF3Uf54sW /tmp/tmp.Ie8vjpku62 ++ return 0 + backup_exists=0 + [[ 0 -eq 1 ]] + '[' -z '' ']' + check_backup_deletion https://s3.amazonaws.com/operator-testing/psmdb-demand-backup-sharded/2024-06-04T15:12:11Z aws-s3 + path=https://s3.amazonaws.com/operator-testing/psmdb-demand-backup-sharded/2024-06-04T15:12:11Z + storage_name=aws-s3 + retry=0 ++ curl -sw '%{http_code}' -o /dev/null https://s3.amazonaws.com/operator-testing/psmdb-demand-backup-sharded/2024-06-04T15:12:11Z + [[ 403 -eq 403 ]] + check_backup_deletion https://storage.googleapis.com/operator-testing/psmdb-demand-backup-sharded/2024-06-04T15:12:53Z gcp-cs + path=https://storage.googleapis.com/operator-testing/psmdb-demand-backup-sharded/2024-06-04T15:12:53Z + storage_name=gcp-cs + retry=0 ++ curl -sw '%{http_code}' -o /dev/null https://storage.googleapis.com/operator-testing/psmdb-demand-backup-sharded/2024-06-04T15:12:53Z + [[ 404 -eq 403 ]] ++ curl -sw '%{http_code}' -o /dev/null https://storage.googleapis.com/operator-testing/psmdb-demand-backup-sharded/2024-06-04T15:12:53Z + [[ 404 -eq 404 ]] + check_backup_deletion https://engk8soperators.blob.core.windows.net/operator-testing/psmdb-demand-backup-sharded/2024-06-04T15:13:41Z azure-blob + path=https://engk8soperators.blob.core.windows.net/operator-testing/psmdb-demand-backup-sharded/2024-06-04T15:13:41Z + storage_name=azure-blob + retry=0 ++ curl -sw '%{http_code}' -o /dev/null https://engk8soperators.blob.core.windows.net/operator-testing/psmdb-demand-backup-sharded/2024-06-04T15:13:41Z + [[ 404 -eq 403 ]] ++ curl -sw '%{http_code}' -o /dev/null https://engk8soperators.blob.core.windows.net/operator-testing/psmdb-demand-backup-sharded/2024-06-04T15:13:41Z + [[ 404 -eq 404 ]] + desc 'check for passwords leak' + set +o xtrace ----------------------------------------------------------------------------------- check for passwords leak ----------------------------------------------------------------------------------- + check_passwords_leak + local secrets + local passwords + local pods ++ kubectl_bin get secrets -o json ++ jq -r '.items[].data | to_entries | .[] | select(.key | (contains("_PASSWORD"))) | .value' +++ mktemp ++ local LAST_OUT=/tmp/tmp.0I8vFE0KYM +++ mktemp ++ local LAST_ERR=/tmp/tmp.sUYYay5lCu ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get secrets -o json ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.0I8vFE0KYM ++ cat /tmp/tmp.sUYYay5lCu ++ rm /tmp/tmp.0I8vFE0KYM /tmp/tmp.sUYYay5lCu ++ return 0 + secrets='YmFja3VwMTIzNDU2 Y2x1c3RlckFkbWluMTIzNDU2 Y2x1c3Rlck1vbml0b3IxMjM0NTY= ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== dXNlckFkbWluMTIzNDU2 YmFja3VwMTIzNDU2 Y2x1c3RlckFkbWluMTIzNDU2 Y2x1c3Rlck1vbml0b3IxMjM0NTY= ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== dXNlckFkbWluMTIzNDU2' + echo secrets=YmFja3VwMTIzNDU2 Y2x1c3RlckFkbWluMTIzNDU2 Y2x1c3Rlck1vbml0b3IxMjM0NTY= ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== dXNlckFkbWluMTIzNDU2 YmFja3VwMTIzNDU2 Y2x1c3RlckFkbWluMTIzNDU2 Y2x1c3Rlck1vbml0b3IxMjM0NTY= ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== dXNlckFkbWluMTIzNDU2 secrets=YmFja3VwMTIzNDU2 Y2x1c3RlckFkbWluMTIzNDU2 Y2x1c3Rlck1vbml0b3IxMjM0NTY= ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== dXNlckFkbWluMTIzNDU2 YmFja3VwMTIzNDU2 Y2x1c3RlckFkbWluMTIzNDU2 Y2x1c3Rlck1vbml0b3IxMjM0NTY= ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== dXNlckFkbWluMTIzNDU2 ++ for i in '$secrets' ++ base64 -d ++ echo ++ for i in '$secrets' ++ base64 -d ++ echo ++ for i in '$secrets' ++ base64 -d ++ echo ++ for i in '$secrets' ++ base64 -d ++ echo ++ for i in '$secrets' ++ base64 -d ++ echo ++ for i in '$secrets' ++ base64 -d ++ echo ++ for i in '$secrets' ++ base64 -d ++ echo ++ for i in '$secrets' ++ base64 -d ++ echo ++ for i in '$secrets' ++ base64 -d ++ echo ++ for i in '$secrets' ++ base64 -d ++ echo + passwords='backup123456 clusterAdmin123456 clusterMonitor123456 databaseAdmin123456 userAdmin123456 backup123456 clusterAdmin123456 clusterMonitor123456 databaseAdmin123456 userAdmin123456 YmFja3VwMTIzNDU2 Y2x1c3RlckFkbWluMTIzNDU2 Y2x1c3Rlck1vbml0b3IxMjM0NTY= ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== dXNlckFkbWluMTIzNDU2 YmFja3VwMTIzNDU2 Y2x1c3RlckFkbWluMTIzNDU2 Y2x1c3Rlck1vbml0b3IxMjM0NTY= ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== dXNlckFkbWluMTIzNDU2' + echo passwords=backup123456 clusterAdmin123456 clusterMonitor123456 databaseAdmin123456 userAdmin123456 backup123456 clusterAdmin123456 clusterMonitor123456 databaseAdmin123456 userAdmin123456 YmFja3VwMTIzNDU2 Y2x1c3RlckFkbWluMTIzNDU2 Y2x1c3Rlck1vbml0b3IxMjM0NTY= ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== dXNlckFkbWluMTIzNDU2 YmFja3VwMTIzNDU2 Y2x1c3RlckFkbWluMTIzNDU2 Y2x1c3Rlck1vbml0b3IxMjM0NTY= ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== dXNlckFkbWluMTIzNDU2 passwords=backup123456 clusterAdmin123456 clusterMonitor123456 databaseAdmin123456 userAdmin123456 backup123456 clusterAdmin123456 clusterMonitor123456 databaseAdmin123456 userAdmin123456 YmFja3VwMTIzNDU2 Y2x1c3RlckFkbWluMTIzNDU2 Y2x1c3Rlck1vbml0b3IxMjM0NTY= ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== dXNlckFkbWluMTIzNDU2 YmFja3VwMTIzNDU2 Y2x1c3RlckFkbWluMTIzNDU2 Y2x1c3Rlck1vbml0b3IxMjM0NTY= ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== dXNlckFkbWluMTIzNDU2 ++ kubectl_bin get pods -o name ++ awk -F / '{print $2}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ZHYeoCS5xs +++ mktemp ++ local LAST_ERR=/tmp/tmp.pCQkoNZCHW ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods -o name ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.ZHYeoCS5xs ++ cat /tmp/tmp.pCQkoNZCHW ++ rm /tmp/tmp.ZHYeoCS5xs /tmp/tmp.pCQkoNZCHW ++ return 0 + pods='minio-service-57dd49b-hzbll psmdb-client-7469665986-r8mgp some-name-cfg-0 some-name-cfg-1 some-name-cfg-2 some-name-mongos-0 some-name-mongos-1 some-name-mongos-2 some-name-rs0-0 some-name-rs0-1 some-name-rs0-2 some-name-rs1-0 some-name-rs1-1 some-name-rs1-2 some-name-rs2-0 some-name-rs2-1 some-name-rs2-2' + echo pods=minio-service-57dd49b-hzbll psmdb-client-7469665986-r8mgp some-name-cfg-0 some-name-cfg-1 some-name-cfg-2 some-name-mongos-0 some-name-mongos-1 some-name-mongos-2 some-name-rs0-0 some-name-rs0-1 some-name-rs0-2 some-name-rs1-0 some-name-rs1-1 some-name-rs1-2 some-name-rs2-0 some-name-rs2-1 some-name-rs2-2 pods=minio-service-57dd49b-hzbll psmdb-client-7469665986-r8mgp some-name-cfg-0 some-name-cfg-1 some-name-cfg-2 some-name-mongos-0 some-name-mongos-1 some-name-mongos-2 some-name-rs0-0 some-name-rs0-1 some-name-rs0-2 some-name-rs1-0 some-name-rs1-1 some-name-rs1-2 some-name-rs2-0 some-name-rs2-1 some-name-rs2-2 + collect_logs demand-backup-sharded-19473 + local containers + local count + NS=demand-backup-sharded-19473 + for p in '$pods' ++ kubectl_bin -n demand-backup-sharded-19473 get pod minio-service-57dd49b-hzbll -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.lRh9VvUFtF +++ mktemp ++ local LAST_ERR=/tmp/tmp.WnZcD53Wpq ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n demand-backup-sharded-19473 get pod minio-service-57dd49b-hzbll -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.lRh9VvUFtF ++ cat /tmp/tmp.WnZcD53Wpq ++ rm /tmp/tmp.lRh9VvUFtF /tmp/tmp.WnZcD53Wpq ++ return 0 + containers=minio + for c in '$containers' + [[ minio =~ pmm ]] + kubectl_bin -n demand-backup-sharded-19473 logs minio-service-57dd49b-hzbll -c minio ++ mktemp + local LAST_OUT=/tmp/tmp.nMYTmHRnJo ++ mktemp + local LAST_ERR=/tmp/tmp.R1OOKHGkob + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-19473 logs minio-service-57dd49b-hzbll -c minio + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.nMYTmHRnJo + cat /tmp/tmp.R1OOKHGkob + rm /tmp/tmp.nMYTmHRnJo /tmp/tmp.R1OOKHGkob + return 0 + echo logs saved in: /tmp/tmp.kUNddeZY37/logs_output-minio-service-57dd49b-hzbll-minio.txt logs saved in: /tmp/tmp.kUNddeZY37/logs_output-minio-service-57dd49b-hzbll-minio.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-minio-service-57dd49b-hzbll-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-minio-service-57dd49b-hzbll-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-minio-service-57dd49b-hzbll-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-minio-service-57dd49b-hzbll-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-minio-service-57dd49b-hzbll-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-minio-service-57dd49b-hzbll-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-minio-service-57dd49b-hzbll-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-minio-service-57dd49b-hzbll-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-minio-service-57dd49b-hzbll-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-minio-service-57dd49b-hzbll-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-minio-service-57dd49b-hzbll-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-minio-service-57dd49b-hzbll-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-minio-service-57dd49b-hzbll-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-minio-service-57dd49b-hzbll-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-minio-service-57dd49b-hzbll-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-minio-service-57dd49b-hzbll-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-minio-service-57dd49b-hzbll-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-minio-service-57dd49b-hzbll-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-minio-service-57dd49b-hzbll-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-minio-service-57dd49b-hzbll-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' ++ kubectl_bin -n demand-backup-sharded-19473 get pod psmdb-client-7469665986-r8mgp -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.TKoklp01vU +++ mktemp ++ local LAST_ERR=/tmp/tmp.ZWETm17P6s ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n demand-backup-sharded-19473 get pod psmdb-client-7469665986-r8mgp -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.TKoklp01vU ++ cat /tmp/tmp.ZWETm17P6s ++ rm /tmp/tmp.TKoklp01vU /tmp/tmp.ZWETm17P6s ++ return 0 + containers=psmdb-client + for c in '$containers' + [[ psmdb-client =~ pmm ]] + kubectl_bin -n demand-backup-sharded-19473 logs psmdb-client-7469665986-r8mgp -c psmdb-client ++ mktemp + local LAST_OUT=/tmp/tmp.oZ7roLjxek ++ mktemp + local LAST_ERR=/tmp/tmp.l8oSShHdHe + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-19473 logs psmdb-client-7469665986-r8mgp -c psmdb-client + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.oZ7roLjxek + cat /tmp/tmp.l8oSShHdHe + rm /tmp/tmp.oZ7roLjxek /tmp/tmp.l8oSShHdHe + return 0 + echo logs saved in: /tmp/tmp.kUNddeZY37/logs_output-psmdb-client-7469665986-r8mgp-psmdb-client.txt logs saved in: /tmp/tmp.kUNddeZY37/logs_output-psmdb-client-7469665986-r8mgp-psmdb-client.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-psmdb-client-7469665986-r8mgp-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-psmdb-client-7469665986-r8mgp-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-psmdb-client-7469665986-r8mgp-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-psmdb-client-7469665986-r8mgp-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-psmdb-client-7469665986-r8mgp-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-psmdb-client-7469665986-r8mgp-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-psmdb-client-7469665986-r8mgp-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-psmdb-client-7469665986-r8mgp-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-psmdb-client-7469665986-r8mgp-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-psmdb-client-7469665986-r8mgp-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-psmdb-client-7469665986-r8mgp-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-psmdb-client-7469665986-r8mgp-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-psmdb-client-7469665986-r8mgp-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-psmdb-client-7469665986-r8mgp-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-psmdb-client-7469665986-r8mgp-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-psmdb-client-7469665986-r8mgp-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-psmdb-client-7469665986-r8mgp-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-psmdb-client-7469665986-r8mgp-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-psmdb-client-7469665986-r8mgp-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-psmdb-client-7469665986-r8mgp-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' ++ kubectl_bin -n demand-backup-sharded-19473 get pod some-name-cfg-0 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.kx3af4rMaE +++ mktemp ++ local LAST_ERR=/tmp/tmp.Lv7GkuZe99 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n demand-backup-sharded-19473 get pod some-name-cfg-0 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.kx3af4rMaE ++ cat /tmp/tmp.Lv7GkuZe99 ++ rm /tmp/tmp.kx3af4rMaE /tmp/tmp.Lv7GkuZe99 ++ return 0 + containers='mongod cfg-sidecar-1 backup-agent' + for c in '$containers' + [[ mongod =~ pmm ]] + kubectl_bin -n demand-backup-sharded-19473 logs some-name-cfg-0 -c mongod ++ mktemp + local LAST_OUT=/tmp/tmp.GXNMXSCeUD ++ mktemp + local LAST_ERR=/tmp/tmp.jHlQNviML0 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-19473 logs some-name-cfg-0 -c mongod + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.GXNMXSCeUD + cat /tmp/tmp.jHlQNviML0 + rm /tmp/tmp.GXNMXSCeUD /tmp/tmp.jHlQNviML0 + return 0 + echo logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-mongod.txt logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-mongod.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ cfg-sidecar-1 =~ pmm ]] + kubectl_bin -n demand-backup-sharded-19473 logs some-name-cfg-0 -c cfg-sidecar-1 ++ mktemp + local LAST_OUT=/tmp/tmp.swR88v5wrk ++ mktemp + local LAST_ERR=/tmp/tmp.Bqxu8qEixh + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-19473 logs some-name-cfg-0 -c cfg-sidecar-1 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.swR88v5wrk + cat /tmp/tmp.Bqxu8qEixh + rm /tmp/tmp.swR88v5wrk /tmp/tmp.Bqxu8qEixh + return 0 + echo logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-cfg-sidecar-1.txt logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-cfg-sidecar-1.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ backup-agent =~ pmm ]] + kubectl_bin -n demand-backup-sharded-19473 logs some-name-cfg-0 -c backup-agent ++ mktemp + local LAST_OUT=/tmp/tmp.7ILGC147dA ++ mktemp + local LAST_ERR=/tmp/tmp.ZwIeg7z98X + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-19473 logs some-name-cfg-0 -c backup-agent + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.7ILGC147dA + cat /tmp/tmp.ZwIeg7z98X + rm /tmp/tmp.7ILGC147dA /tmp/tmp.ZwIeg7z98X + return 0 + echo logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-backup-agent.txt logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-backup-agent.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' ++ kubectl_bin -n demand-backup-sharded-19473 get pod some-name-cfg-1 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.JAkan2Wqke +++ mktemp ++ local LAST_ERR=/tmp/tmp.Cl5JhC1IoP ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n demand-backup-sharded-19473 get pod some-name-cfg-1 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.JAkan2Wqke ++ cat /tmp/tmp.Cl5JhC1IoP ++ rm /tmp/tmp.JAkan2Wqke /tmp/tmp.Cl5JhC1IoP ++ return 0 + containers='mongod cfg-sidecar-1 backup-agent' + for c in '$containers' + [[ mongod =~ pmm ]] + kubectl_bin -n demand-backup-sharded-19473 logs some-name-cfg-1 -c mongod ++ mktemp + local LAST_OUT=/tmp/tmp.6bynoSsuAW ++ mktemp + local LAST_ERR=/tmp/tmp.MvRr9XltVE + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-19473 logs some-name-cfg-1 -c mongod + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.6bynoSsuAW + cat /tmp/tmp.MvRr9XltVE + rm /tmp/tmp.6bynoSsuAW /tmp/tmp.MvRr9XltVE + return 0 + echo logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-mongod.txt logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-mongod.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ cfg-sidecar-1 =~ pmm ]] + kubectl_bin -n demand-backup-sharded-19473 logs some-name-cfg-1 -c cfg-sidecar-1 ++ mktemp + local LAST_OUT=/tmp/tmp.E7RUO4VEGz ++ mktemp + local LAST_ERR=/tmp/tmp.3ES1fJLRwe + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-19473 logs some-name-cfg-1 -c cfg-sidecar-1 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.E7RUO4VEGz + cat /tmp/tmp.3ES1fJLRwe + rm /tmp/tmp.E7RUO4VEGz /tmp/tmp.3ES1fJLRwe + return 0 + echo logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-cfg-sidecar-1.txt logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-cfg-sidecar-1.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ backup-agent =~ pmm ]] + kubectl_bin -n demand-backup-sharded-19473 logs some-name-cfg-1 -c backup-agent ++ mktemp + local LAST_OUT=/tmp/tmp.0jgIVeqaWr ++ mktemp + local LAST_ERR=/tmp/tmp.l7Stk2RNkg + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-19473 logs some-name-cfg-1 -c backup-agent + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.0jgIVeqaWr + cat /tmp/tmp.l7Stk2RNkg + rm /tmp/tmp.0jgIVeqaWr /tmp/tmp.l7Stk2RNkg + return 0 + echo logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-backup-agent.txt logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-backup-agent.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' ++ kubectl_bin -n demand-backup-sharded-19473 get pod some-name-cfg-2 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.gaYmDZCpgJ +++ mktemp ++ local LAST_ERR=/tmp/tmp.c3embHREz2 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n demand-backup-sharded-19473 get pod some-name-cfg-2 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.gaYmDZCpgJ ++ cat /tmp/tmp.c3embHREz2 ++ rm /tmp/tmp.gaYmDZCpgJ /tmp/tmp.c3embHREz2 ++ return 0 + containers='mongod cfg-sidecar-1 backup-agent' + for c in '$containers' + [[ mongod =~ pmm ]] + kubectl_bin -n demand-backup-sharded-19473 logs some-name-cfg-2 -c mongod ++ mktemp + local LAST_OUT=/tmp/tmp.ozPT6wvR0f ++ mktemp + local LAST_ERR=/tmp/tmp.MBKnM1LM1F + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-19473 logs some-name-cfg-2 -c mongod + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.ozPT6wvR0f + cat /tmp/tmp.MBKnM1LM1F + rm /tmp/tmp.ozPT6wvR0f /tmp/tmp.MBKnM1LM1F + return 0 + echo logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-mongod.txt logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-mongod.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ cfg-sidecar-1 =~ pmm ]] + kubectl_bin -n demand-backup-sharded-19473 logs some-name-cfg-2 -c cfg-sidecar-1 ++ mktemp + local LAST_OUT=/tmp/tmp.RnhwT8A9aM ++ mktemp + local LAST_ERR=/tmp/tmp.Nby9ocIdi0 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-19473 logs some-name-cfg-2 -c cfg-sidecar-1 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.RnhwT8A9aM + cat /tmp/tmp.Nby9ocIdi0 + rm /tmp/tmp.RnhwT8A9aM /tmp/tmp.Nby9ocIdi0 + return 0 + echo logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-cfg-sidecar-1.txt logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-cfg-sidecar-1.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ backup-agent =~ pmm ]] + kubectl_bin -n demand-backup-sharded-19473 logs some-name-cfg-2 -c backup-agent ++ mktemp + local LAST_OUT=/tmp/tmp.ZBEuDkDx7a ++ mktemp + local LAST_ERR=/tmp/tmp.ZbarwdeWHR + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-19473 logs some-name-cfg-2 -c backup-agent + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.ZBEuDkDx7a + cat /tmp/tmp.ZbarwdeWHR + rm /tmp/tmp.ZBEuDkDx7a /tmp/tmp.ZbarwdeWHR + return 0 + echo logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-backup-agent.txt logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-backup-agent.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' ++ kubectl_bin -n demand-backup-sharded-19473 get pod some-name-mongos-0 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.tLDGWJNgPO +++ mktemp ++ local LAST_ERR=/tmp/tmp.feIgJtdkcP ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n demand-backup-sharded-19473 get pod some-name-mongos-0 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.tLDGWJNgPO ++ cat /tmp/tmp.feIgJtdkcP ++ rm /tmp/tmp.tLDGWJNgPO /tmp/tmp.feIgJtdkcP ++ return 0 + containers='mongos mongos-sidecar-1' + for c in '$containers' + [[ mongos =~ pmm ]] + kubectl_bin -n demand-backup-sharded-19473 logs some-name-mongos-0 -c mongos ++ mktemp + local LAST_OUT=/tmp/tmp.3j8UhnCQ40 ++ mktemp + local LAST_ERR=/tmp/tmp.xu9Dc2CJEZ + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-19473 logs some-name-mongos-0 -c mongos + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.3j8UhnCQ40 + cat /tmp/tmp.xu9Dc2CJEZ + rm /tmp/tmp.3j8UhnCQ40 /tmp/tmp.xu9Dc2CJEZ + return 0 + echo logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-0-mongos.txt logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-0-mongos.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ mongos-sidecar-1 =~ pmm ]] + kubectl_bin -n demand-backup-sharded-19473 logs some-name-mongos-0 -c mongos-sidecar-1 ++ mktemp + local LAST_OUT=/tmp/tmp.xEa3V3WLo2 ++ mktemp + local LAST_ERR=/tmp/tmp.UissKyPNeu + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-19473 logs some-name-mongos-0 -c mongos-sidecar-1 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.xEa3V3WLo2 + cat /tmp/tmp.UissKyPNeu + rm /tmp/tmp.xEa3V3WLo2 /tmp/tmp.UissKyPNeu + return 0 + echo logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-0-mongos-sidecar-1.txt logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-0-mongos-sidecar-1.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' ++ kubectl_bin -n demand-backup-sharded-19473 get pod some-name-mongos-1 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.UWFJ3GwMBb +++ mktemp ++ local LAST_ERR=/tmp/tmp.cXqESVAhkB ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n demand-backup-sharded-19473 get pod some-name-mongos-1 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.UWFJ3GwMBb ++ cat /tmp/tmp.cXqESVAhkB ++ rm /tmp/tmp.UWFJ3GwMBb /tmp/tmp.cXqESVAhkB ++ return 0 + containers='mongos mongos-sidecar-1' + for c in '$containers' + [[ mongos =~ pmm ]] + kubectl_bin -n demand-backup-sharded-19473 logs some-name-mongos-1 -c mongos ++ mktemp + local LAST_OUT=/tmp/tmp.baHjo2LE7x ++ mktemp + local LAST_ERR=/tmp/tmp.leyj0WkSRD + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-19473 logs some-name-mongos-1 -c mongos + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.baHjo2LE7x + cat /tmp/tmp.leyj0WkSRD + rm /tmp/tmp.baHjo2LE7x /tmp/tmp.leyj0WkSRD + return 0 + echo logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-1-mongos.txt logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-1-mongos.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ mongos-sidecar-1 =~ pmm ]] + kubectl_bin -n demand-backup-sharded-19473 logs some-name-mongos-1 -c mongos-sidecar-1 ++ mktemp + local LAST_OUT=/tmp/tmp.wN5DLe5Kni ++ mktemp + local LAST_ERR=/tmp/tmp.NZpMTsf0sC + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-19473 logs some-name-mongos-1 -c mongos-sidecar-1 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.wN5DLe5Kni + cat /tmp/tmp.NZpMTsf0sC + rm /tmp/tmp.wN5DLe5Kni /tmp/tmp.NZpMTsf0sC + return 0 + echo logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-1-mongos-sidecar-1.txt logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-1-mongos-sidecar-1.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' ++ kubectl_bin -n demand-backup-sharded-19473 get pod some-name-mongos-2 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Dd0f1jI49c +++ mktemp ++ local LAST_ERR=/tmp/tmp.p0yGCRBZk5 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n demand-backup-sharded-19473 get pod some-name-mongos-2 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.Dd0f1jI49c ++ cat /tmp/tmp.p0yGCRBZk5 ++ rm /tmp/tmp.Dd0f1jI49c /tmp/tmp.p0yGCRBZk5 ++ return 0 + containers='mongos mongos-sidecar-1' + for c in '$containers' + [[ mongos =~ pmm ]] + kubectl_bin -n demand-backup-sharded-19473 logs some-name-mongos-2 -c mongos ++ mktemp + local LAST_OUT=/tmp/tmp.F8bgkmZ2Ct ++ mktemp + local LAST_ERR=/tmp/tmp.rkXE8EMph7 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-19473 logs some-name-mongos-2 -c mongos + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.F8bgkmZ2Ct + cat /tmp/tmp.rkXE8EMph7 + rm /tmp/tmp.F8bgkmZ2Ct /tmp/tmp.rkXE8EMph7 + return 0 + echo logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-2-mongos.txt logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-2-mongos.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ mongos-sidecar-1 =~ pmm ]] + kubectl_bin -n demand-backup-sharded-19473 logs some-name-mongos-2 -c mongos-sidecar-1 ++ mktemp + local LAST_OUT=/tmp/tmp.CjkOtIncFi ++ mktemp + local LAST_ERR=/tmp/tmp.ZTQs7gTXSI + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-19473 logs some-name-mongos-2 -c mongos-sidecar-1 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.CjkOtIncFi + cat /tmp/tmp.ZTQs7gTXSI + rm /tmp/tmp.CjkOtIncFi /tmp/tmp.ZTQs7gTXSI + return 0 + echo logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-2-mongos-sidecar-1.txt logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-2-mongos-sidecar-1.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' ++ kubectl_bin -n demand-backup-sharded-19473 get pod some-name-rs0-0 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.iog4lBFm6U +++ mktemp ++ local LAST_ERR=/tmp/tmp.bb42p1O4CR ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n demand-backup-sharded-19473 get pod some-name-rs0-0 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.iog4lBFm6U ++ cat /tmp/tmp.bb42p1O4CR ++ rm /tmp/tmp.iog4lBFm6U /tmp/tmp.bb42p1O4CR ++ return 0 + containers='mongod backup-agent' + for c in '$containers' + [[ mongod =~ pmm ]] + kubectl_bin -n demand-backup-sharded-19473 logs some-name-rs0-0 -c mongod ++ mktemp + local LAST_OUT=/tmp/tmp.POoUXuxWy1 ++ mktemp + local LAST_ERR=/tmp/tmp.TDnpPqcnSp + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-19473 logs some-name-rs0-0 -c mongod + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.POoUXuxWy1 + cat /tmp/tmp.TDnpPqcnSp + rm /tmp/tmp.POoUXuxWy1 /tmp/tmp.TDnpPqcnSp + return 0 + echo logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-0-mongod.txt logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-0-mongod.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ backup-agent =~ pmm ]] + kubectl_bin -n demand-backup-sharded-19473 logs some-name-rs0-0 -c backup-agent ++ mktemp + local LAST_OUT=/tmp/tmp.Vxqq1jJ4Xq ++ mktemp + local LAST_ERR=/tmp/tmp.HtDD5IBhn6 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-19473 logs some-name-rs0-0 -c backup-agent + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.Vxqq1jJ4Xq + cat /tmp/tmp.HtDD5IBhn6 + rm /tmp/tmp.Vxqq1jJ4Xq /tmp/tmp.HtDD5IBhn6 + return 0 + echo logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-0-backup-agent.txt logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-0-backup-agent.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' ++ kubectl_bin -n demand-backup-sharded-19473 get pod some-name-rs0-1 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.N4zlERJ5tb +++ mktemp ++ local LAST_ERR=/tmp/tmp.G3CXnbokMl ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n demand-backup-sharded-19473 get pod some-name-rs0-1 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.N4zlERJ5tb ++ cat /tmp/tmp.G3CXnbokMl ++ rm /tmp/tmp.N4zlERJ5tb /tmp/tmp.G3CXnbokMl ++ return 0 + containers='mongod backup-agent' + for c in '$containers' + [[ mongod =~ pmm ]] + kubectl_bin -n demand-backup-sharded-19473 logs some-name-rs0-1 -c mongod ++ mktemp + local LAST_OUT=/tmp/tmp.LBTPwTvb5G ++ mktemp + local LAST_ERR=/tmp/tmp.EJp9u3AXjg + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-19473 logs some-name-rs0-1 -c mongod + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.LBTPwTvb5G + cat /tmp/tmp.EJp9u3AXjg + rm /tmp/tmp.LBTPwTvb5G /tmp/tmp.EJp9u3AXjg + return 0 + echo logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-1-mongod.txt logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-1-mongod.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ backup-agent =~ pmm ]] + kubectl_bin -n demand-backup-sharded-19473 logs some-name-rs0-1 -c backup-agent ++ mktemp + local LAST_OUT=/tmp/tmp.ASw5JvMrym ++ mktemp + local LAST_ERR=/tmp/tmp.vmfugehHdN + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-19473 logs some-name-rs0-1 -c backup-agent + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.ASw5JvMrym + cat /tmp/tmp.vmfugehHdN + rm /tmp/tmp.ASw5JvMrym /tmp/tmp.vmfugehHdN + return 0 + echo logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-1-backup-agent.txt logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-1-backup-agent.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' ++ kubectl_bin -n demand-backup-sharded-19473 get pod some-name-rs0-2 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ldo4rQmBx3 +++ mktemp ++ local LAST_ERR=/tmp/tmp.sIL1JN48DT ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n demand-backup-sharded-19473 get pod some-name-rs0-2 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.ldo4rQmBx3 ++ cat /tmp/tmp.sIL1JN48DT ++ rm /tmp/tmp.ldo4rQmBx3 /tmp/tmp.sIL1JN48DT ++ return 0 + containers='mongod backup-agent' + for c in '$containers' + [[ mongod =~ pmm ]] + kubectl_bin -n demand-backup-sharded-19473 logs some-name-rs0-2 -c mongod ++ mktemp + local LAST_OUT=/tmp/tmp.csDDJJ7XYz ++ mktemp + local LAST_ERR=/tmp/tmp.9XXBJ0s2Yn + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-19473 logs some-name-rs0-2 -c mongod + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.csDDJJ7XYz + cat /tmp/tmp.9XXBJ0s2Yn + rm /tmp/tmp.csDDJJ7XYz /tmp/tmp.9XXBJ0s2Yn + return 0 + echo logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-2-mongod.txt logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-2-mongod.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ backup-agent =~ pmm ]] + kubectl_bin -n demand-backup-sharded-19473 logs some-name-rs0-2 -c backup-agent ++ mktemp + local LAST_OUT=/tmp/tmp.5L45h6o8aJ ++ mktemp + local LAST_ERR=/tmp/tmp.xaoVJnO6Po + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-19473 logs some-name-rs0-2 -c backup-agent + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.5L45h6o8aJ + cat /tmp/tmp.xaoVJnO6Po + rm /tmp/tmp.5L45h6o8aJ /tmp/tmp.xaoVJnO6Po + return 0 + echo logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-2-backup-agent.txt logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-2-backup-agent.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' ++ kubectl_bin -n demand-backup-sharded-19473 get pod some-name-rs1-0 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.bA6YDY66dH +++ mktemp ++ local LAST_ERR=/tmp/tmp.opeuXNVqxc ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n demand-backup-sharded-19473 get pod some-name-rs1-0 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.bA6YDY66dH ++ cat /tmp/tmp.opeuXNVqxc ++ rm /tmp/tmp.bA6YDY66dH /tmp/tmp.opeuXNVqxc ++ return 0 + containers='mongod backup-agent' + for c in '$containers' + [[ mongod =~ pmm ]] + kubectl_bin -n demand-backup-sharded-19473 logs some-name-rs1-0 -c mongod ++ mktemp + local LAST_OUT=/tmp/tmp.XD31AMFF9A ++ mktemp + local LAST_ERR=/tmp/tmp.ho15A4JM5Q + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-19473 logs some-name-rs1-0 -c mongod + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.XD31AMFF9A + cat /tmp/tmp.ho15A4JM5Q + rm /tmp/tmp.XD31AMFF9A /tmp/tmp.ho15A4JM5Q + return 0 + echo logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-0-mongod.txt logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-0-mongod.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ backup-agent =~ pmm ]] + kubectl_bin -n demand-backup-sharded-19473 logs some-name-rs1-0 -c backup-agent ++ mktemp + local LAST_OUT=/tmp/tmp.Fb1Efwt3EZ ++ mktemp + local LAST_ERR=/tmp/tmp.pdyXRMkvys + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-19473 logs some-name-rs1-0 -c backup-agent + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.Fb1Efwt3EZ + cat /tmp/tmp.pdyXRMkvys + rm /tmp/tmp.Fb1Efwt3EZ /tmp/tmp.pdyXRMkvys + return 0 + echo logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-0-backup-agent.txt logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-0-backup-agent.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' ++ kubectl_bin -n demand-backup-sharded-19473 get pod some-name-rs1-1 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ukR3fyxlMa +++ mktemp ++ local LAST_ERR=/tmp/tmp.68iXYcVxld ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n demand-backup-sharded-19473 get pod some-name-rs1-1 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.ukR3fyxlMa ++ cat /tmp/tmp.68iXYcVxld ++ rm /tmp/tmp.ukR3fyxlMa /tmp/tmp.68iXYcVxld ++ return 0 + containers='mongod backup-agent' + for c in '$containers' + [[ mongod =~ pmm ]] + kubectl_bin -n demand-backup-sharded-19473 logs some-name-rs1-1 -c mongod ++ mktemp + local LAST_OUT=/tmp/tmp.qQKoRAxwOn ++ mktemp + local LAST_ERR=/tmp/tmp.a4MoaEpcTF + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-19473 logs some-name-rs1-1 -c mongod + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.qQKoRAxwOn + cat /tmp/tmp.a4MoaEpcTF + rm /tmp/tmp.qQKoRAxwOn /tmp/tmp.a4MoaEpcTF + return 0 + echo logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-1-mongod.txt logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-1-mongod.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ backup-agent =~ pmm ]] + kubectl_bin -n demand-backup-sharded-19473 logs some-name-rs1-1 -c backup-agent ++ mktemp + local LAST_OUT=/tmp/tmp.RuLEFYZv1M ++ mktemp + local LAST_ERR=/tmp/tmp.am3wA5qOFg + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-19473 logs some-name-rs1-1 -c backup-agent + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.RuLEFYZv1M + cat /tmp/tmp.am3wA5qOFg + rm /tmp/tmp.RuLEFYZv1M /tmp/tmp.am3wA5qOFg + return 0 + echo logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-1-backup-agent.txt logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-1-backup-agent.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' ++ kubectl_bin -n demand-backup-sharded-19473 get pod some-name-rs1-2 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.JgvxaGD286 +++ mktemp ++ local LAST_ERR=/tmp/tmp.XYkbSKjvCD ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n demand-backup-sharded-19473 get pod some-name-rs1-2 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.JgvxaGD286 ++ cat /tmp/tmp.XYkbSKjvCD ++ rm /tmp/tmp.JgvxaGD286 /tmp/tmp.XYkbSKjvCD ++ return 0 + containers='mongod backup-agent' + for c in '$containers' + [[ mongod =~ pmm ]] + kubectl_bin -n demand-backup-sharded-19473 logs some-name-rs1-2 -c mongod ++ mktemp + local LAST_OUT=/tmp/tmp.CuQME4QWq3 ++ mktemp + local LAST_ERR=/tmp/tmp.EPRQf05dXh + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-19473 logs some-name-rs1-2 -c mongod + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.CuQME4QWq3 + cat /tmp/tmp.EPRQf05dXh + rm /tmp/tmp.CuQME4QWq3 /tmp/tmp.EPRQf05dXh + return 0 + echo logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-2-mongod.txt logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-2-mongod.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ backup-agent =~ pmm ]] + kubectl_bin -n demand-backup-sharded-19473 logs some-name-rs1-2 -c backup-agent ++ mktemp + local LAST_OUT=/tmp/tmp.bNL6WD6aO7 ++ mktemp + local LAST_ERR=/tmp/tmp.OrdOWfwcJi + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-19473 logs some-name-rs1-2 -c backup-agent + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.bNL6WD6aO7 + cat /tmp/tmp.OrdOWfwcJi + rm /tmp/tmp.bNL6WD6aO7 /tmp/tmp.OrdOWfwcJi + return 0 + echo logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-2-backup-agent.txt logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-2-backup-agent.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' ++ kubectl_bin -n demand-backup-sharded-19473 get pod some-name-rs2-0 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.g5oyrgoB2z +++ mktemp ++ local LAST_ERR=/tmp/tmp.8On5pfX3KY ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n demand-backup-sharded-19473 get pod some-name-rs2-0 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.g5oyrgoB2z ++ cat /tmp/tmp.8On5pfX3KY ++ rm /tmp/tmp.g5oyrgoB2z /tmp/tmp.8On5pfX3KY ++ return 0 + containers='mongod rs-sidecar-1 backup-agent' + for c in '$containers' + [[ mongod =~ pmm ]] + kubectl_bin -n demand-backup-sharded-19473 logs some-name-rs2-0 -c mongod ++ mktemp + local LAST_OUT=/tmp/tmp.hvUwg3tBd2 ++ mktemp + local LAST_ERR=/tmp/tmp.m0LHa5It9I + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-19473 logs some-name-rs2-0 -c mongod + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.hvUwg3tBd2 + cat /tmp/tmp.m0LHa5It9I + rm /tmp/tmp.hvUwg3tBd2 /tmp/tmp.m0LHa5It9I + return 0 + echo logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-mongod.txt logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-mongod.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ rs-sidecar-1 =~ pmm ]] + kubectl_bin -n demand-backup-sharded-19473 logs some-name-rs2-0 -c rs-sidecar-1 ++ mktemp + local LAST_OUT=/tmp/tmp.KIB17BtOwh ++ mktemp + local LAST_ERR=/tmp/tmp.dpJS518M5k + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-19473 logs some-name-rs2-0 -c rs-sidecar-1 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.KIB17BtOwh + cat /tmp/tmp.dpJS518M5k + rm /tmp/tmp.KIB17BtOwh /tmp/tmp.dpJS518M5k + return 0 + echo logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-rs-sidecar-1.txt logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-rs-sidecar-1.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ backup-agent =~ pmm ]] + kubectl_bin -n demand-backup-sharded-19473 logs some-name-rs2-0 -c backup-agent ++ mktemp + local LAST_OUT=/tmp/tmp.1K1y6cHYXY ++ mktemp + local LAST_ERR=/tmp/tmp.kx7zJkHcZ8 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-19473 logs some-name-rs2-0 -c backup-agent + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.1K1y6cHYXY + cat /tmp/tmp.kx7zJkHcZ8 + rm /tmp/tmp.1K1y6cHYXY /tmp/tmp.kx7zJkHcZ8 + return 0 + echo logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-backup-agent.txt logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-backup-agent.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' ++ kubectl_bin -n demand-backup-sharded-19473 get pod some-name-rs2-1 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.x3n7cVxAaF +++ mktemp ++ local LAST_ERR=/tmp/tmp.QkxnBsN8FZ ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n demand-backup-sharded-19473 get pod some-name-rs2-1 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.x3n7cVxAaF ++ cat /tmp/tmp.QkxnBsN8FZ ++ rm /tmp/tmp.x3n7cVxAaF /tmp/tmp.QkxnBsN8FZ ++ return 0 + containers='mongod rs-sidecar-1 backup-agent' + for c in '$containers' + [[ mongod =~ pmm ]] + kubectl_bin -n demand-backup-sharded-19473 logs some-name-rs2-1 -c mongod ++ mktemp + local LAST_OUT=/tmp/tmp.TXXPwDTpiP ++ mktemp + local LAST_ERR=/tmp/tmp.hnTUZJKXuO + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-19473 logs some-name-rs2-1 -c mongod + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.TXXPwDTpiP + cat /tmp/tmp.hnTUZJKXuO + rm /tmp/tmp.TXXPwDTpiP /tmp/tmp.hnTUZJKXuO + return 0 + echo logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-mongod.txt logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-mongod.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ rs-sidecar-1 =~ pmm ]] + kubectl_bin -n demand-backup-sharded-19473 logs some-name-rs2-1 -c rs-sidecar-1 ++ mktemp + local LAST_OUT=/tmp/tmp.Lr5cVP6lsd ++ mktemp + local LAST_ERR=/tmp/tmp.2OZPYwZEn7 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-19473 logs some-name-rs2-1 -c rs-sidecar-1 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.Lr5cVP6lsd + cat /tmp/tmp.2OZPYwZEn7 + rm /tmp/tmp.Lr5cVP6lsd /tmp/tmp.2OZPYwZEn7 + return 0 + echo logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-rs-sidecar-1.txt logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-rs-sidecar-1.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ backup-agent =~ pmm ]] + kubectl_bin -n demand-backup-sharded-19473 logs some-name-rs2-1 -c backup-agent ++ mktemp + local LAST_OUT=/tmp/tmp.aaxd9TZBd9 ++ mktemp + local LAST_ERR=/tmp/tmp.l7GRVm4tVH + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-19473 logs some-name-rs2-1 -c backup-agent + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.aaxd9TZBd9 + cat /tmp/tmp.l7GRVm4tVH + rm /tmp/tmp.aaxd9TZBd9 /tmp/tmp.l7GRVm4tVH + return 0 + echo logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-backup-agent.txt logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-backup-agent.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' ++ kubectl_bin -n demand-backup-sharded-19473 get pod some-name-rs2-2 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Vcya4TnXJi +++ mktemp ++ local LAST_ERR=/tmp/tmp.77mXloeInI ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n demand-backup-sharded-19473 get pod some-name-rs2-2 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.Vcya4TnXJi ++ cat /tmp/tmp.77mXloeInI ++ rm /tmp/tmp.Vcya4TnXJi /tmp/tmp.77mXloeInI ++ return 0 + containers='mongod rs-sidecar-1 backup-agent' + for c in '$containers' + [[ mongod =~ pmm ]] + kubectl_bin -n demand-backup-sharded-19473 logs some-name-rs2-2 -c mongod ++ mktemp + local LAST_OUT=/tmp/tmp.i2XUUuR6sJ ++ mktemp + local LAST_ERR=/tmp/tmp.nsDix12XzN + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-19473 logs some-name-rs2-2 -c mongod + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.i2XUUuR6sJ + cat /tmp/tmp.nsDix12XzN + rm /tmp/tmp.i2XUUuR6sJ /tmp/tmp.nsDix12XzN + return 0 + echo logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-mongod.txt logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-mongod.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ rs-sidecar-1 =~ pmm ]] + kubectl_bin -n demand-backup-sharded-19473 logs some-name-rs2-2 -c rs-sidecar-1 ++ mktemp + local LAST_OUT=/tmp/tmp.OngNVH4mIh ++ mktemp + local LAST_ERR=/tmp/tmp.wwNZMwapNT + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-19473 logs some-name-rs2-2 -c rs-sidecar-1 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.OngNVH4mIh + cat /tmp/tmp.wwNZMwapNT + rm /tmp/tmp.OngNVH4mIh /tmp/tmp.wwNZMwapNT + return 0 + echo logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-rs-sidecar-1.txt logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-rs-sidecar-1.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ backup-agent =~ pmm ]] + kubectl_bin -n demand-backup-sharded-19473 logs some-name-rs2-2 -c backup-agent ++ mktemp + local LAST_OUT=/tmp/tmp.NyVcAO0M3Y ++ mktemp + local LAST_ERR=/tmp/tmp.rq2osobYH3 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-19473 logs some-name-rs2-2 -c backup-agent + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.NyVcAO0M3Y + cat /tmp/tmp.rq2osobYH3 + rm /tmp/tmp.NyVcAO0M3Y /tmp/tmp.rq2osobYH3 + return 0 + echo logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-backup-agent.txt logs saved in: /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-backup-agent.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + '[' -n psmdb-operator ']' ++ kubectl_bin -n psmdb-operator get pods -o name ++ awk -F / '{print $2}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ZbcBCsgJQY +++ mktemp ++ local LAST_ERR=/tmp/tmp.9ChJpZsh6M ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n psmdb-operator get pods -o name ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.ZbcBCsgJQY ++ cat /tmp/tmp.9ChJpZsh6M ++ rm /tmp/tmp.ZbcBCsgJQY /tmp/tmp.9ChJpZsh6M ++ return 0 + pods=percona-server-mongodb-operator-56586457c4-97zlt + collect_logs psmdb-operator + local containers + local count + NS=psmdb-operator + for p in '$pods' ++ kubectl_bin -n psmdb-operator get pod percona-server-mongodb-operator-56586457c4-97zlt -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Jkn7sKgch6 +++ mktemp ++ local LAST_ERR=/tmp/tmp.q99cKsOtJB ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n psmdb-operator get pod percona-server-mongodb-operator-56586457c4-97zlt -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.Jkn7sKgch6 ++ cat /tmp/tmp.q99cKsOtJB ++ rm /tmp/tmp.Jkn7sKgch6 /tmp/tmp.q99cKsOtJB ++ return 0 + containers=percona-server-mongodb-operator + for c in '$containers' + [[ percona-server-mongodb-operator =~ pmm ]] + kubectl_bin -n psmdb-operator logs percona-server-mongodb-operator-56586457c4-97zlt -c percona-server-mongodb-operator ++ mktemp + local LAST_OUT=/tmp/tmp.QSIoyK9HO3 ++ mktemp + local LAST_ERR=/tmp/tmp.4JDhwluq8A + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n psmdb-operator logs percona-server-mongodb-operator-56586457c4-97zlt -c percona-server-mongodb-operator + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.QSIoyK9HO3 + cat /tmp/tmp.4JDhwluq8A + rm /tmp/tmp.QSIoyK9HO3 /tmp/tmp.4JDhwluq8A + return 0 + echo logs saved in: /tmp/tmp.kUNddeZY37/logs_output-percona-server-mongodb-operator-56586457c4-97zlt-percona-server-mongodb-operator.txt logs saved in: /tmp/tmp.kUNddeZY37/logs_output-percona-server-mongodb-operator-56586457c4-97zlt-percona-server-mongodb-operator.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-percona-server-mongodb-operator-56586457c4-97zlt-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-percona-server-mongodb-operator-56586457c4-97zlt-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-percona-server-mongodb-operator-56586457c4-97zlt-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-percona-server-mongodb-operator-56586457c4-97zlt-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-percona-server-mongodb-operator-56586457c4-97zlt-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.kUNddeZY37/logs_output-percona-server-mongodb-operator-56586457c4-97zlt-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-percona-server-mongodb-operator-56586457c4-97zlt-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.kUNddeZY37/logs_output-percona-server-mongodb-operator-56586457c4-97zlt-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-percona-server-mongodb-operator-56586457c4-97zlt-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.kUNddeZY37/logs_output-percona-server-mongodb-operator-56586457c4-97zlt-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-percona-server-mongodb-operator-56586457c4-97zlt-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-percona-server-mongodb-operator-56586457c4-97zlt-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-percona-server-mongodb-operator-56586457c4-97zlt-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-percona-server-mongodb-operator-56586457c4-97zlt-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-percona-server-mongodb-operator-56586457c4-97zlt-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-percona-server-mongodb-operator-56586457c4-97zlt-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-percona-server-mongodb-operator-56586457c4-97zlt-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.kUNddeZY37/logs_output-percona-server-mongodb-operator-56586457c4-97zlt-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.kUNddeZY37/logs_output-percona-server-mongodb-operator-56586457c4-97zlt-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.kUNddeZY37/logs_output-percona-server-mongodb-operator-56586457c4-97zlt-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + kubectl_bin delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/conf/container-rc.yaml ++ mktemp + local LAST_OUT=/tmp/tmp.pmeVXXkwnZ ++ mktemp + local LAST_ERR=/tmp/tmp.9UCDid63TX + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/e2e-tests/conf/container-rc.yaml + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.pmeVXXkwnZ runtimeclass.node.k8s.io "container-rc" deleted + cat /tmp/tmp.9UCDid63TX + rm /tmp/tmp.pmeVXXkwnZ /tmp/tmp.9UCDid63TX + return 0 + destroy demand-backup-sharded-19473 + local namespace=demand-backup-sharded-19473 + local ignore_logs=true + desc 'destroy cluster/operator and all other resources' + set +o xtrace ----------------------------------------------------------------------------------- destroy cluster/operator and all other resources ----------------------------------------------------------------------------------- + '[' true == false ']' + delete_crd + desc 'get and delete old CRDs and RBAC' + set +o xtrace ----------------------------------------------------------------------------------- get and delete old CRDs and RBAC ----------------------------------------------------------------------------------- + kubectl_bin delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/deploy/crd.yaml --ignore-not-found --wait=false ++ mktemp + local LAST_OUT=/tmp/tmp.Mh9xTV0qgH ++ mktemp + local LAST_ERR=/tmp/tmp.CG70Km0JoB + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/deploy/crd.yaml --ignore-not-found --wait=false + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.Mh9xTV0qgH customresourcedefinition.apiextensions.k8s.io "perconaservermongodbbackups.psmdb.percona.com" deleted customresourcedefinition.apiextensions.k8s.io "perconaservermongodbrestores.psmdb.percona.com" deleted customresourcedefinition.apiextensions.k8s.io "perconaservermongodbs.psmdb.percona.com" deleted + cat /tmp/tmp.CG70Km0JoB + rm /tmp/tmp.Mh9xTV0qgH /tmp/tmp.CG70Km0JoB + return 0 ++ yq eval .metadata.name /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/deploy/crd.yaml ++ grep -v '\-\-\-' + for crd_name in '$(yq eval '\''.metadata.name'\'' "${src_dir}/deploy/crd.yaml" | grep -v '\''\-\-\-'\'')' + kubectl get perconaservermongodbbackups.psmdb.percona.com --all-namespaces -o wide + grep -v NAMESPACE + xargs -L 1 sh -xc 'kubectl patch perconaservermongodbbackups.psmdb.percona.com -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' error: the server doesn't have a resource type "perconaservermongodbbackups" + kubectl patch perconaservermongodbbackups.psmdb.percona.com -n sh --type=merge -p '{"metadata":{"finalizers":[]}}' error: the server doesn't have a resource type "perconaservermongodbbackups" + : + kubectl_bin wait --for=delete crd perconaservermongodbbackups.psmdb.percona.com ++ mktemp + local LAST_OUT=/tmp/tmp.y38sDdjArj ++ mktemp + local LAST_ERR=/tmp/tmp.0S8APvyjoX + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=delete crd perconaservermongodbbackups.psmdb.percona.com + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.y38sDdjArj + cat /tmp/tmp.0S8APvyjoX + rm /tmp/tmp.y38sDdjArj /tmp/tmp.0S8APvyjoX + return 0 + for crd_name in '$(yq eval '\''.metadata.name'\'' "${src_dir}/deploy/crd.yaml" | grep -v '\''\-\-\-'\'')' + kubectl get perconaservermongodbrestores.psmdb.percona.com --all-namespaces -o wide + grep -v NAMESPACE + xargs -L 1 sh -xc 'kubectl patch perconaservermongodbrestores.psmdb.percona.com -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' error: the server doesn't have a resource type "perconaservermongodbrestores" + kubectl patch perconaservermongodbrestores.psmdb.percona.com -n sh --type=merge -p '{"metadata":{"finalizers":[]}}' error: the server doesn't have a resource type "perconaservermongodbrestores" + : + kubectl_bin wait --for=delete crd perconaservermongodbrestores.psmdb.percona.com ++ mktemp + local LAST_OUT=/tmp/tmp.6XRdn30L5h ++ mktemp + local LAST_ERR=/tmp/tmp.qRQus01EWz + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=delete crd perconaservermongodbrestores.psmdb.percona.com + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.6XRdn30L5h + cat /tmp/tmp.qRQus01EWz + rm /tmp/tmp.6XRdn30L5h /tmp/tmp.qRQus01EWz + return 0 + for crd_name in '$(yq eval '\''.metadata.name'\'' "${src_dir}/deploy/crd.yaml" | grep -v '\''\-\-\-'\'')' + kubectl get perconaservermongodbs.psmdb.percona.com --all-namespaces -o wide + grep -v NAMESPACE + xargs -L 1 sh -xc 'kubectl patch perconaservermongodbs.psmdb.percona.com -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' error: the server doesn't have a resource type "perconaservermongodbs" + kubectl patch perconaservermongodbs.psmdb.percona.com -n sh --type=merge -p '{"metadata":{"finalizers":[]}}' error: the server doesn't have a resource type "perconaservermongodbs" + : + kubectl_bin wait --for=delete crd perconaservermongodbs.psmdb.percona.com ++ mktemp + local LAST_OUT=/tmp/tmp.52S4kz3u7Z ++ mktemp + local LAST_ERR=/tmp/tmp.w55e8CoSQa + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=delete crd perconaservermongodbs.psmdb.percona.com + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.52S4kz3u7Z + cat /tmp/tmp.w55e8CoSQa + rm /tmp/tmp.52S4kz3u7Z /tmp/tmp.w55e8CoSQa + return 0 + local rbac_yaml=rbac.yaml + '[' -n psmdb-operator ']' + rbac_yaml=cw-rbac.yaml + kubectl_bin delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/deploy/cw-rbac.yaml --ignore-not-found ++ mktemp + local LAST_OUT=/tmp/tmp.BFucNIjY1E ++ mktemp + local LAST_ERR=/tmp/tmp.sCuOyFiCWC + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1551/deploy/cw-rbac.yaml --ignore-not-found + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.BFucNIjY1E clusterrole.rbac.authorization.k8s.io "percona-server-mongodb-operator" deleted clusterrolebinding.rbac.authorization.k8s.io "service-account-percona-server-mongodb-operator" deleted + cat /tmp/tmp.sCuOyFiCWC + rm /tmp/tmp.BFucNIjY1E /tmp/tmp.sCuOyFiCWC + return 0 + kubectl_bin delete -f https://github.com/cert-manager/cert-manager/releases/download/v1.14.5/cert-manager.yaml + : + '[' -n '' ']' + '[' -n psmdb-operator ']' + kubectl_bin delete --grace-period=0 --force=true namespace demand-backup-sharded-19473 + rm -rf /tmp/tmp.kUNddeZY37 + kubectl_bin delete --grace-period=0 --force=true namespace psmdb-operator ++ mktemp ++ mktemp + local LAST_OUT=/tmp/tmp.ja22fJWBf7 ++ mktemp + local LAST_OUT=/tmp/tmp.z60MLtd7Fm ++ mktemp + local LAST_ERR=/tmp/tmp.ly18a5Ehy6 + local exit_status=0 + local timeout=4 + local LAST_ERR=/tmp/tmp.6CQySokmBo ++ seq 0 2 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete --grace-period=0 --force=true namespace demand-backup-sharded-19473 + for i in '$(seq 0 2)' + set +e + kubectl delete --grace-period=0 --force=true namespace psmdb-operator