++ echo 'Log: /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/logs/demand-backup-sharded.log' Log: /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/logs/demand-backup-sharded.log ++ '[' -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/conf/cloud-secret.yml ']' ++ SKIP_BACKUPS_TO_AWS_GCP_AZURE= ++ oc get projects ++ grep '^minikube' ++ kubectl get nodes +++ kubectl version -o json +++ grep '\-eks\-' +++ jq -r .serverVersion.gitVersion WARNING: version difference between client (1.30) and server (1.26) exceeds the supported minor version skew of +/-1 ++ '[' ']' ++ EKS=0 +++ kubectl version -o json +++ jq -r .serverVersion.gitVersion +++ grep gke WARNING: version difference between client (1.30) and server (1.26) exceeds the supported minor version skew of +/-1 ++ '[' v1.26.15-gke.1360000 ']' ++ GKE=1 +++ kubectl version -o json +++ jq -r '.serverVersion.major + "." + .serverVersion.minor' +++ /usr/bin/sed -r 's/[^0-9.]+//g' WARNING: version difference between client (1.30) and server (1.26) exceeds the supported minor version skew of +/-1 ++ KUBE_VERSION=1.26 + set_debug + [[ 1 == 1 ]] + set -o xtrace + create_infra demand-backup-sharded-16515 + local ns=demand-backup-sharded-16515 + delete_crd + desc 'get and delete old CRDs and RBAC' + set +o xtrace ----------------------------------------------------------------------------------- get and delete old CRDs and RBAC ----------------------------------------------------------------------------------- + kubectl_bin delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/deploy/crd.yaml --ignore-not-found --wait=false ++ mktemp + local LAST_OUT=/tmp/tmp.zSAi9TZRUy ++ mktemp + local LAST_ERR=/tmp/tmp.qPrKimA1su + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/deploy/crd.yaml --ignore-not-found --wait=false + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.zSAi9TZRUy customresourcedefinition.apiextensions.k8s.io "perconaservermongodbbackups.psmdb.percona.com" deleted customresourcedefinition.apiextensions.k8s.io "perconaservermongodbrestores.psmdb.percona.com" deleted customresourcedefinition.apiextensions.k8s.io "perconaservermongodbs.psmdb.percona.com" deleted + cat /tmp/tmp.qPrKimA1su + rm /tmp/tmp.zSAi9TZRUy /tmp/tmp.qPrKimA1su + return 0 ++ yq eval .metadata.name /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/deploy/crd.yaml ++ grep -v '\-\-\-' + for crd_name in '$(yq eval '\''.metadata.name'\'' "${src_dir}/deploy/crd.yaml" | grep -v '\''\-\-\-'\'')' + xargs -L 1 sh -xc 'kubectl patch perconaservermongodbbackups.psmdb.percona.com -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' + kubectl get perconaservermongodbbackups.psmdb.percona.com --all-namespaces -o wide + grep -v NAMESPACE error: the server doesn't have a resource type "perconaservermongodbbackups" + kubectl patch perconaservermongodbbackups.psmdb.percona.com -n sh --type=merge -p '{"metadata":{"finalizers":[]}}' error: the server doesn't have a resource type "perconaservermongodbbackups" + : + kubectl_bin wait --for=delete crd perconaservermongodbbackups.psmdb.percona.com ++ mktemp + local LAST_OUT=/tmp/tmp.rEVrbzKsZx ++ mktemp + local LAST_ERR=/tmp/tmp.sonp2tkU3M + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=delete crd perconaservermongodbbackups.psmdb.percona.com + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.rEVrbzKsZx + cat /tmp/tmp.sonp2tkU3M + rm /tmp/tmp.rEVrbzKsZx /tmp/tmp.sonp2tkU3M + return 0 + for crd_name in '$(yq eval '\''.metadata.name'\'' "${src_dir}/deploy/crd.yaml" | grep -v '\''\-\-\-'\'')' + kubectl get perconaservermongodbrestores.psmdb.percona.com --all-namespaces -o wide + xargs -L 1 sh -xc 'kubectl patch perconaservermongodbrestores.psmdb.percona.com -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' + grep -v NAMESPACE error: the server doesn't have a resource type "perconaservermongodbrestores" + kubectl patch perconaservermongodbrestores.psmdb.percona.com -n sh --type=merge -p '{"metadata":{"finalizers":[]}}' error: the server doesn't have a resource type "perconaservermongodbrestores" + : + kubectl_bin wait --for=delete crd perconaservermongodbrestores.psmdb.percona.com ++ mktemp + local LAST_OUT=/tmp/tmp.WqKO1ck3mk ++ mktemp + local LAST_ERR=/tmp/tmp.GG6mAMEDjW + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=delete crd perconaservermongodbrestores.psmdb.percona.com + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.WqKO1ck3mk + cat /tmp/tmp.GG6mAMEDjW + rm /tmp/tmp.WqKO1ck3mk /tmp/tmp.GG6mAMEDjW + return 0 + for crd_name in '$(yq eval '\''.metadata.name'\'' "${src_dir}/deploy/crd.yaml" | grep -v '\''\-\-\-'\'')' + kubectl get perconaservermongodbs.psmdb.percona.com --all-namespaces -o wide + grep -v NAMESPACE + xargs -L 1 sh -xc 'kubectl patch perconaservermongodbs.psmdb.percona.com -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' error: the server doesn't have a resource type "perconaservermongodbs" + kubectl patch perconaservermongodbs.psmdb.percona.com -n sh --type=merge -p '{"metadata":{"finalizers":[]}}' error: the server doesn't have a resource type "perconaservermongodbs" + : + kubectl_bin wait --for=delete crd perconaservermongodbs.psmdb.percona.com ++ mktemp + local LAST_OUT=/tmp/tmp.o3BvqX4ewi ++ mktemp + local LAST_ERR=/tmp/tmp.ZgjVtkM8V4 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=delete crd perconaservermongodbs.psmdb.percona.com + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.o3BvqX4ewi + cat /tmp/tmp.ZgjVtkM8V4 + rm /tmp/tmp.o3BvqX4ewi /tmp/tmp.ZgjVtkM8V4 + return 0 + local rbac_yaml=rbac.yaml + '[' -n psmdb-operator ']' + rbac_yaml=cw-rbac.yaml + kubectl_bin delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/deploy/cw-rbac.yaml --ignore-not-found ++ mktemp + local LAST_OUT=/tmp/tmp.UtaHLMb3LJ ++ mktemp + local LAST_ERR=/tmp/tmp.h14JH7lDxz + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/deploy/cw-rbac.yaml --ignore-not-found + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.UtaHLMb3LJ clusterrole.rbac.authorization.k8s.io "percona-server-mongodb-operator" deleted clusterrolebinding.rbac.authorization.k8s.io "service-account-percona-server-mongodb-operator" deleted + cat /tmp/tmp.h14JH7lDxz + rm /tmp/tmp.UtaHLMb3LJ /tmp/tmp.h14JH7lDxz + return 0 + check_crd_for_deletion PR-1561-964e15bc + local git_tag=PR-1561-964e15bc ++ curl -s https://raw.githubusercontent.com/percona/percona-server-mongodb-operator/PR-1561-964e15bc/deploy/crd.yaml ++ /usr/bin/sed ':a;N;$!ba;s/\n/ /g' ++ yq eval .metadata.name ++ /usr/bin/sed s/---//g + for crd_name in '$(curl -s https://raw.githubusercontent.com/percona/percona-server-mongodb-operator/${git_tag}/deploy/crd.yaml | yq eval '\''.metadata.name'\'' | $sed '\''s/---//g'\'' | $sed '\'':a;N;$!ba;s/\n/ /g'\'')' ++ kubectl_bin get crd/null -o 'jsonpath={.status.conditions[-1].type}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.0FTde0eQMx +++ mktemp ++ local LAST_ERR=/tmp/tmp.Q9UjYAMEHr ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get crd/null -o 'jsonpath={.status.conditions[-1].type}' ++ exit_status=1 ++ set -e ++ '[' 1 '!=' 0 -a -n 1 ']' ++ cat /tmp/tmp.0FTde0eQMx ++ cat /tmp/tmp.Q9UjYAMEHr Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "null" not found ++ sleep 0 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get crd/null -o 'jsonpath={.status.conditions[-1].type}' ++ exit_status=1 ++ set -e ++ '[' 1 '!=' 0 -a -n 1 ']' ++ cat /tmp/tmp.0FTde0eQMx ++ cat /tmp/tmp.Q9UjYAMEHr Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "null" not found ++ sleep 4 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get crd/null -o 'jsonpath={.status.conditions[-1].type}' ++ exit_status=1 ++ set -e ++ '[' 1 '!=' 0 -a -n 1 ']' ++ cat /tmp/tmp.0FTde0eQMx ++ cat /tmp/tmp.Q9UjYAMEHr Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "null" not found ++ sleep 8 ++ cat /tmp/tmp.0FTde0eQMx ++ cat /tmp/tmp.Q9UjYAMEHr Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "null" not found ++ rm /tmp/tmp.0FTde0eQMx /tmp/tmp.Q9UjYAMEHr ++ return 1 + [[ '' == \T\e\r\m\i\n\a\t\i\n\g ]] + '[' -n psmdb-operator ']' + create_namespace psmdb-operator + local namespace=psmdb-operator + local skip_clean_namespace= + [[ 1 == 1 ]] + [[ -z '' ]] + destroy_chaos_mesh ++ helm list --all-namespaces --filter chaos-mesh ++ tail -n1 ++ awk '-F ' '{print $2}' ++ sed s/NAMESPACE// + local chaos_mesh_ns= + desc 'destroy chaos-mesh' + set +o xtrace ----------------------------------------------------------------------------------- destroy chaos-mesh ----------------------------------------------------------------------------------- + '[' -n '' ']' ++ kubectl get MutatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete MutatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ awk '{print $1}' ++ grep validate-auth + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl api-resources ++ grep chaos-mesh ++ awk '{print $1}' ++ awk '{print $1}' ++ kubectl get crd ++ grep chaos-mesh.org + timeout 30 kubectl delete crd error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrolebinding ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrolebinding error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrole ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrole error: resource(s) were provided, but no name was specified + : + desc 'cleaned up all old namespaces' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up all old namespaces ----------------------------------------------------------------------------------- + egrep -v '^kube-|^default|Terminating|psmdb-operator|openshift|gke-mcs|^NAME' + kubectl_bin get ns + '[' -n '' ']' + desc 'cleaned up old namespaces psmdb-operator' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up old namespaces psmdb-operator ----------------------------------------------------------------------------------- + kubectl_bin delete namespace psmdb-operator --ignore-not-found + awk '{print$1}' ++ mktemp ++ mktemp + local LAST_OUT=/tmp/tmp.w3Lr0hCNk4 + local LAST_OUT=/tmp/tmp.UuSn2zyobj ++ mktemp ++ mktemp + xargs kubectl delete ns + local LAST_ERR=/tmp/tmp.rihKVk2t7d + local exit_status=0 + local timeout=4 ++ seq 0 2 + local LAST_ERR=/tmp/tmp.Bkq7TFEurt + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete namespace psmdb-operator --ignore-not-found + for i in '$(seq 0 2)' + set +e + kubectl get ns + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.w3Lr0hCNk4 + cat /tmp/tmp.Bkq7TFEurt + rm /tmp/tmp.w3Lr0hCNk4 /tmp/tmp.Bkq7TFEurt + return 0 namespace "demand-backup-sharded-3012" deleted + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.UuSn2zyobj namespace "psmdb-operator" deleted + cat /tmp/tmp.rihKVk2t7d + rm /tmp/tmp.UuSn2zyobj /tmp/tmp.rihKVk2t7d + return 0 + kubectl_bin wait --for=delete namespace psmdb-operator ++ mktemp + local LAST_OUT=/tmp/tmp.X90IfVS1f7 ++ mktemp + local LAST_ERR=/tmp/tmp.at0oW6IHLg + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=delete namespace psmdb-operator + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.X90IfVS1f7 + cat /tmp/tmp.at0oW6IHLg + rm /tmp/tmp.X90IfVS1f7 /tmp/tmp.at0oW6IHLg + return 0 + desc 'create namespace psmdb-operator' + set +o xtrace ----------------------------------------------------------------------------------- create namespace psmdb-operator ----------------------------------------------------------------------------------- + kubectl_bin create namespace psmdb-operator ++ mktemp + local LAST_OUT=/tmp/tmp.0la25hWnsp ++ mktemp + local LAST_ERR=/tmp/tmp.XOvDDTlJ0o + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl create namespace psmdb-operator + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.0la25hWnsp namespace/psmdb-operator created + cat /tmp/tmp.XOvDDTlJ0o + rm /tmp/tmp.0la25hWnsp /tmp/tmp.XOvDDTlJ0o + return 0 ++ kubectl_bin config current-context +++ mktemp ++ local LAST_OUT=/tmp/tmp.igc5DglPau +++ mktemp ++ local LAST_ERR=/tmp/tmp.JqtUiSVsOT ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl config current-context ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.igc5DglPau ++ cat /tmp/tmp.JqtUiSVsOT ++ rm /tmp/tmp.igc5DglPau /tmp/tmp.JqtUiSVsOT ++ return 0 + kubectl_bin config set-context gke_cloud-dev-112233_us-central1-a_jen-psmdb-1561-964e15bc-4-cluster2 --namespace=psmdb-operator ++ mktemp + local LAST_OUT=/tmp/tmp.fyb8mLzAmM ++ mktemp + local LAST_ERR=/tmp/tmp.OzlBND6wI5 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl config set-context gke_cloud-dev-112233_us-central1-a_jen-psmdb-1561-964e15bc-4-cluster2 --namespace=psmdb-operator + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.fyb8mLzAmM Context "gke_cloud-dev-112233_us-central1-a_jen-psmdb-1561-964e15bc-4-cluster2" modified. + cat /tmp/tmp.OzlBND6wI5 + rm /tmp/tmp.fyb8mLzAmM /tmp/tmp.OzlBND6wI5 + return 0 + deploy_operator + desc 'start PSMDB operator' + set +o xtrace ----------------------------------------------------------------------------------- start PSMDB operator ----------------------------------------------------------------------------------- + local cr_file + '[' -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/conf/crd.yaml ']' + cr_file=/mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/deploy/crd.yaml + kubectl_bin apply --server-side --force-conflicts -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/deploy/crd.yaml ++ mktemp + local LAST_OUT=/tmp/tmp.tOmztQuKpH ++ mktemp + local LAST_ERR=/tmp/tmp.cz9gDNPS6D + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply --server-side --force-conflicts -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/deploy/crd.yaml + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.tOmztQuKpH customresourcedefinition.apiextensions.k8s.io/perconaservermongodbbackups.psmdb.percona.com serverside-applied customresourcedefinition.apiextensions.k8s.io/perconaservermongodbrestores.psmdb.percona.com serverside-applied customresourcedefinition.apiextensions.k8s.io/perconaservermongodbs.psmdb.percona.com serverside-applied + cat /tmp/tmp.cz9gDNPS6D + rm /tmp/tmp.tOmztQuKpH /tmp/tmp.cz9gDNPS6D + return 0 + '[' -n psmdb-operator ']' + apply_rbac cw-rbac + local operator_namespace=psmdb-operator + local rbac=cw-rbac + cat /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/deploy/cw-rbac.yaml + sed -e 's^namespace: .*^namespace: psmdb-operator^' + kubectl_bin apply -n psmdb-operator -f - ++ mktemp + local LAST_OUT=/tmp/tmp.YToX4r1Uot ++ mktemp + local LAST_ERR=/tmp/tmp.A1OunTNU74 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -n psmdb-operator -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.YToX4r1Uot clusterrole.rbac.authorization.k8s.io/percona-server-mongodb-operator created serviceaccount/percona-server-mongodb-operator created clusterrolebinding.rbac.authorization.k8s.io/service-account-percona-server-mongodb-operator created + cat /tmp/tmp.A1OunTNU74 + rm /tmp/tmp.YToX4r1Uot /tmp/tmp.A1OunTNU74 + return 0 + kubectl_bin apply -f - + yq eval ' (.spec.template.spec.containers[].image = "perconalab/percona-server-mongodb-operator:PR-1561-964e15bc") | ((.. | select(.[] == "DISABLE_TELEMETRY")) |= .value="true") | ((.. | select(.[] == "LOG_LEVEL")) |= .value="DEBUG")' /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/deploy/cw-operator.yaml ++ mktemp + local LAST_OUT=/tmp/tmp.GW9CGwcv3l ++ mktemp + local LAST_ERR=/tmp/tmp.RGgpFWXcXU + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.GW9CGwcv3l deployment.apps/percona-server-mongodb-operator created + cat /tmp/tmp.RGgpFWXcXU + rm /tmp/tmp.GW9CGwcv3l /tmp/tmp.RGgpFWXcXU + return 0 + sleep 2 ++ get_operator_pod ++ kubectl_bin get pods --selector=name=percona-server-mongodb-operator -o 'jsonpath={.items[].metadata.name}' -n psmdb-operator +++ mktemp ++ local LAST_OUT=/tmp/tmp.aKXU3XO4A3 +++ mktemp ++ local LAST_ERR=/tmp/tmp.Aqq7JYk5F6 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=percona-server-mongodb-operator -o 'jsonpath={.items[].metadata.name}' -n psmdb-operator ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.aKXU3XO4A3 ++ cat /tmp/tmp.Aqq7JYk5F6 ++ rm /tmp/tmp.aKXU3XO4A3 /tmp/tmp.Aqq7JYk5F6 ++ return 0 + wait_pod percona-server-mongodb-operator-9f9787b4c-mkzqz + local pod=percona-server-mongodb-operator-9f9787b4c-mkzqz + set +o xtrace waiting for pod/percona-server-mongodb-operator-9f9787b4c-mkzqz to be ready.OK + create_namespace demand-backup-sharded-16515 + local namespace=demand-backup-sharded-16515 + local skip_clean_namespace= + [[ 1 == 1 ]] + [[ -z '' ]] + destroy_chaos_mesh ++ helm list --all-namespaces --filter chaos-mesh ++ tail -n1 ++ awk '-F ' '{print $2}' ++ sed s/NAMESPACE// + local chaos_mesh_ns= + desc 'destroy chaos-mesh' + set +o xtrace ----------------------------------------------------------------------------------- destroy chaos-mesh ----------------------------------------------------------------------------------- + '[' -n '' ']' ++ awk '{print $1}' ++ kubectl get MutatingWebhookConfiguration ++ grep chaos-mesh + timeout 30 kubectl delete MutatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep validate-auth ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl api-resources ++ grep chaos-mesh ++ awk '{print $1}' ++ kubectl get crd ++ grep chaos-mesh.org ++ awk '{print $1}' + timeout 30 kubectl delete crd error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrolebinding ++ awk '{print $1}' ++ grep chaos-mesh + timeout 30 kubectl delete clusterrolebinding error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrole ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrole error: resource(s) were provided, but no name was specified + : + desc 'cleaned up all old namespaces' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up all old namespaces ----------------------------------------------------------------------------------- + '[' -n '' ']' + desc 'cleaned up old namespaces demand-backup-sharded-16515' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up old namespaces demand-backup-sharded-16515 ----------------------------------------------------------------------------------- + kubectl_bin delete namespace demand-backup-sharded-16515 --ignore-not-found ++ mktemp + xargs kubectl delete ns + awk '{print$1}' + kubectl_bin get ns ++ mktemp + local LAST_OUT=/tmp/tmp.He48vUkdvl ++ mktemp + egrep -v '^kube-|^default|Terminating|psmdb-operator|openshift|gke-mcs|^NAME' + local LAST_ERR=/tmp/tmp.C2KZDD7tnT + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get ns + local LAST_OUT=/tmp/tmp.69WzS2ei1P ++ mktemp + local LAST_ERR=/tmp/tmp.VBYqFp0SNm + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete namespace demand-backup-sharded-16515 --ignore-not-found + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.He48vUkdvl + cat /tmp/tmp.C2KZDD7tnT + rm /tmp/tmp.He48vUkdvl /tmp/tmp.C2KZDD7tnT + return 0 error: resource(s) were provided, but no name was specified + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.69WzS2ei1P + cat /tmp/tmp.VBYqFp0SNm + rm /tmp/tmp.69WzS2ei1P /tmp/tmp.VBYqFp0SNm + return 0 + kubectl_bin wait --for=delete namespace demand-backup-sharded-16515 ++ mktemp + local LAST_OUT=/tmp/tmp.v8dLHl8vxw ++ mktemp + local LAST_ERR=/tmp/tmp.kWWjs6rO9O + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=delete namespace demand-backup-sharded-16515 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.v8dLHl8vxw + cat /tmp/tmp.kWWjs6rO9O + rm /tmp/tmp.v8dLHl8vxw /tmp/tmp.kWWjs6rO9O + return 0 + desc 'create namespace demand-backup-sharded-16515' + set +o xtrace ----------------------------------------------------------------------------------- create namespace demand-backup-sharded-16515 ----------------------------------------------------------------------------------- + kubectl_bin create namespace demand-backup-sharded-16515 ++ mktemp + local LAST_OUT=/tmp/tmp.1iqYdgEfX8 ++ mktemp + local LAST_ERR=/tmp/tmp.GM9pBH402b + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl create namespace demand-backup-sharded-16515 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.1iqYdgEfX8 namespace/demand-backup-sharded-16515 created + cat /tmp/tmp.GM9pBH402b + rm /tmp/tmp.1iqYdgEfX8 /tmp/tmp.GM9pBH402b + return 0 ++ kubectl_bin config current-context +++ mktemp ++ local LAST_OUT=/tmp/tmp.G7WJE9OvJ3 +++ mktemp ++ local LAST_ERR=/tmp/tmp.7xjoc325Z6 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl config current-context ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.G7WJE9OvJ3 ++ cat /tmp/tmp.7xjoc325Z6 ++ rm /tmp/tmp.G7WJE9OvJ3 /tmp/tmp.7xjoc325Z6 ++ return 0 + kubectl_bin config set-context gke_cloud-dev-112233_us-central1-a_jen-psmdb-1561-964e15bc-4-cluster2 --namespace=demand-backup-sharded-16515 ++ mktemp + local LAST_OUT=/tmp/tmp.tgBzOo1gwX ++ mktemp + local LAST_ERR=/tmp/tmp.BJcfCRnS3S + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl config set-context gke_cloud-dev-112233_us-central1-a_jen-psmdb-1561-964e15bc-4-cluster2 --namespace=demand-backup-sharded-16515 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.tgBzOo1gwX Context "gke_cloud-dev-112233_us-central1-a_jen-psmdb-1561-964e15bc-4-cluster2" modified. + cat /tmp/tmp.BJcfCRnS3S + rm /tmp/tmp.tgBzOo1gwX /tmp/tmp.BJcfCRnS3S + return 0 + deploy_minio + desc 'install Minio' + set +o xtrace ----------------------------------------------------------------------------------- install Minio ----------------------------------------------------------------------------------- + helm uninstall minio-service Error: uninstall: Release not loaded: minio-service: release: not found + : + helm repo remove minio "minio" has been removed from your repositories + helm repo add minio https://charts.min.io/ "minio" has been added to your repositories + retry 10 60 helm install minio-service --version 5.0.14 --set replicas=1 --set mode=standalone --set resources.requests.memory=256Mi --set rootUser=rootuser --set rootPassword=rootpass123 --set 'users[0].accessKey=some-access-key' --set 'users[0].secretKey=some-secret-key' --set 'users[0].policy=consoleAdmin' --set service.type=ClusterIP --set configPathmc=/tmp/.minio/ --set persistence.size=2G --set securityContext.enabled=false minio/minio + local max=10 + local delay=60 + shift 2 + local n=1 + helm install minio-service --version 5.0.14 --set replicas=1 --set mode=standalone --set resources.requests.memory=256Mi --set rootUser=rootuser --set rootPassword=rootpass123 --set 'users[0].accessKey=some-access-key' --set 'users[0].secretKey=some-secret-key' --set 'users[0].policy=consoleAdmin' --set service.type=ClusterIP --set configPathmc=/tmp/.minio/ --set persistence.size=2G --set securityContext.enabled=false minio/minio NAME: minio-service LAST DEPLOYED: Wed May 29 13:25:21 2024 NAMESPACE: demand-backup-sharded-16515 STATUS: deployed REVISION: 1 TEST SUITE: None NOTES: MinIO can be accessed via port 9000 on the following DNS name from within your cluster: minio-service.demand-backup-sharded-16515.svc.cluster.local To access MinIO from localhost, run the below commands: 1. export POD_NAME=$(kubectl get pods --namespace demand-backup-sharded-16515 -l "release=minio-service" -o jsonpath="{.items[0].metadata.name}") 2. kubectl port-forward $POD_NAME 9000 --namespace demand-backup-sharded-16515 Read more about port forwarding here: http://kubernetes.io/docs/user-guide/kubectl/kubectl_port-forward/ You can now access MinIO server on http://localhost:9000. Follow the below steps to connect to MinIO server with mc client: 1. Download the MinIO mc client - https://min.io/docs/minio/linux/reference/minio-mc.html#quickstart 2. export MC_HOST_minio-service-local=http://$(kubectl get secret --namespace demand-backup-sharded-16515 minio-service -o jsonpath="{.data.rootUser}" | base64 --decode):$(kubectl get secret --namespace demand-backup-sharded-16515 minio-service -o jsonpath="{.data.rootPassword}" | base64 --decode)@localhost:9000 3. mc ls minio-service-local ++ kubectl_bin get pods --selector=release=minio-service -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.L7E9xju2k0 +++ mktemp ++ local LAST_ERR=/tmp/tmp.J9DcxwMmmi ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=release=minio-service -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.L7E9xju2k0 ++ cat /tmp/tmp.J9DcxwMmmi ++ rm /tmp/tmp.L7E9xju2k0 /tmp/tmp.J9DcxwMmmi ++ return 0 + MINIO_POD=minio-service-57dd49b-nfqp7 + wait_pod minio-service-57dd49b-nfqp7 + local pod=minio-service-57dd49b-nfqp7 + set +o xtrace waiting for pod/minio-service-57dd49b-nfqp7 to be ready.OK + '[' -n psmdb-operator ']' + kubectl_bin create svc -n psmdb-operator externalname minio-service --external-name=minio-service.demand-backup-sharded-16515.svc.cluster.local --tcp=9000 ++ mktemp + local LAST_OUT=/tmp/tmp.3QvmZZJZYA ++ mktemp + local LAST_ERR=/tmp/tmp.l7ZzEjuAdY + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl create svc -n psmdb-operator externalname minio-service --external-name=minio-service.demand-backup-sharded-16515.svc.cluster.local --tcp=9000 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.3QvmZZJZYA service/minio-service created + cat /tmp/tmp.l7ZzEjuAdY + rm /tmp/tmp.3QvmZZJZYA /tmp/tmp.l7ZzEjuAdY + return 0 + kubectl_bin run -i --rm aws-cli --image=perconalab/awscli --restart=Never -- bash -c 'AWS_ACCESS_KEY_ID=some-access-key AWS_SECRET_ACCESS_KEY=some-secret-key AWS_DEFAULT_REGION=us-east-1 \ /usr/bin/aws --endpoint-url http://minio-service:9000 s3 mb s3://operator-testing' ++ mktemp + local LAST_OUT=/tmp/tmp.bLflU5zHsZ ++ mktemp + local LAST_ERR=/tmp/tmp.dF2ESBeg7G + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl run -i --rm aws-cli --image=perconalab/awscli --restart=Never -- bash -c 'AWS_ACCESS_KEY_ID=some-access-key AWS_SECRET_ACCESS_KEY=some-secret-key AWS_DEFAULT_REGION=us-east-1 \ /usr/bin/aws --endpoint-url http://minio-service:9000 s3 mb s3://operator-testing' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.bLflU5zHsZ make_bucket: operator-testing pod "aws-cli" deleted + cat /tmp/tmp.dF2ESBeg7G If you don't see a command prompt, try pressing enter. warning: couldn't attach to pod/aws-cli, falling back to streaming logs: unable to upgrade connection: container aws-cli not found in pod aws-cli_demand-backup-sharded-16515 + rm /tmp/tmp.bLflU5zHsZ /tmp/tmp.dF2ESBeg7G + return 0 + desc 'create first PSMDB cluster' + set +o xtrace ----------------------------------------------------------------------------------- create first PSMDB cluster ----------------------------------------------------------------------------------- + cluster=some-name + kubectl_bin apply -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/conf/secrets.yml -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/conf/client.yml ++ mktemp + local LAST_OUT=/tmp/tmp.nOGbR6OPfl ++ mktemp + local LAST_ERR=/tmp/tmp.tAWGvuj5KH + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/conf/secrets.yml -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/conf/client.yml + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.nOGbR6OPfl secret/some-users created deployment.apps/psmdb-client created + cat /tmp/tmp.tAWGvuj5KH + rm /tmp/tmp.nOGbR6OPfl /tmp/tmp.tAWGvuj5KH + return 0 + apply_s3_storage_secrets + desc 'create secrets for cloud storages' + set +o xtrace ----------------------------------------------------------------------------------- create secrets for cloud storages ----------------------------------------------------------------------------------- + '[' -z '' ']' + kubectl_bin apply -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/conf/minio-secret.yml -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/conf/cloud-secret.yml ++ mktemp + local LAST_OUT=/tmp/tmp.mV9bwdFtzN ++ mktemp + local LAST_ERR=/tmp/tmp.msvOWLjdZS + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/conf/minio-secret.yml -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/conf/cloud-secret.yml + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.mV9bwdFtzN secret/minio-secret created secret/aws-s3-secret created secret/gcp-cs-secret created secret/azure-secret created + cat /tmp/tmp.msvOWLjdZS + rm /tmp/tmp.mV9bwdFtzN /tmp/tmp.msvOWLjdZS + return 0 + version_gt 1.19 ++ echo '1.26 >= 1.19' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' 0 -ne 1 ']' + cat /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/conf/container-rc.yaml + kubectl_bin apply -f - + /usr/bin/sed s/docker/runc/g ++ mktemp + local LAST_OUT=/tmp/tmp.Xf7WI9hLxt ++ mktemp + local LAST_ERR=/tmp/tmp.a8uuERtsWn + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.Xf7WI9hLxt runtimeclass.node.k8s.io/container-rc unchanged + cat /tmp/tmp.a8uuERtsWn + rm /tmp/tmp.Xf7WI9hLxt /tmp/tmp.a8uuERtsWn + return 0 + apply_cluster /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/conf/some-name-rs0.yml + '[' -z '' ']' + cat_config /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/conf/some-name-rs0.yml + kubectl_bin apply -f - + cat /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/conf/some-name-rs0.yml + yq eval '(.spec | select(.image == null)).image = "perconalab/percona-server-mongodb-operator:main-mongod7.0"' ++ mktemp + yq eval '(.spec | select(has("initImage"))).initImage = "perconalab/percona-server-mongodb-operator:PR-1561-964e15bc"' + local LAST_OUT=/tmp/tmp.bavyYAqbw4 + yq eval '(.spec | select(has("backup"))).backup.image = "perconalab/percona-server-mongodb-operator:main-backup"' ++ mktemp + yq eval '(.spec | select(has("pmm"))).pmm.image = "perconalab/pmm-client:dev-latest"' + yq eval '.spec.upgradeOptions.apply="Never"' + local LAST_ERR=/tmp/tmp.Mk3RhTsX8P + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.bavyYAqbw4 perconaservermongodb.psmdb.percona.com/some-name created + cat /tmp/tmp.Mk3RhTsX8P + rm /tmp/tmp.bavyYAqbw4 /tmp/tmp.Mk3RhTsX8P + return 0 + desc 'check if all 3 Pods started' + set +o xtrace ----------------------------------------------------------------------------------- check if all 3 Pods started ----------------------------------------------------------------------------------- + wait_for_running some-name-rs0 3 + local name=some-name-rs0 + let last_pod=2 + local check_cluster_readyness=true + set_debug + [[ 1 == 1 ]] + set -o xtrace + local rs_name=rs0 + local cluster_name=some-name ++ seq 0 2 + for i in '$(seq 0 $last_pod)' + [[ 0 -eq 2 ]] + wait_pod some-name-rs0-0 + local pod=some-name-rs0-0 + set +o xtrace waiting for pod/some-name-rs0-0 to be ready.......OK + for i in '$(seq 0 $last_pod)' + [[ 1 -eq 2 ]] + wait_pod some-name-rs0-1 + local pod=some-name-rs0-1 + set +o xtrace waiting for pod/some-name-rs0-1 to be ready.........OK + for i in '$(seq 0 $last_pod)' + [[ 2 -eq 2 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="rs0")].arbiter.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.o7TF0oexWB +++ mktemp ++ local LAST_ERR=/tmp/tmp.OFTv8bnoq3 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="rs0")].arbiter.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.o7TF0oexWB ++ cat /tmp/tmp.OFTv8bnoq3 ++ rm /tmp/tmp.o7TF0oexWB /tmp/tmp.OFTv8bnoq3 ++ return 0 + [[ '' == \t\r\u\e ]] + wait_pod some-name-rs0-2 + local pod=some-name-rs0-2 + set +o xtrace waiting for pod/some-name-rs0-2 to be ready.........OK ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="rs0")].non_voting.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.D2v0bYwvCH +++ mktemp ++ local LAST_ERR=/tmp/tmp.SVyekrIWwE ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="rs0")].non_voting.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.D2v0bYwvCH ++ cat /tmp/tmp.SVyekrIWwE ++ rm /tmp/tmp.D2v0bYwvCH /tmp/tmp.SVyekrIWwE ++ return 0 + [[ '' == \t\r\u\e ]] + sleep 10 + [[ true == \t\r\u\e ]] + set +x Waiting for cluster readyness............................................ + wait_for_running some-name-cfg 3 false + local name=some-name-cfg + let last_pod=2 + local check_cluster_readyness=false + set_debug + [[ 1 == 1 ]] + set -o xtrace + local rs_name=cfg + local cluster_name=some-name ++ seq 0 2 + for i in '$(seq 0 $last_pod)' + [[ 0 -eq 2 ]] + wait_pod some-name-cfg-0 + local pod=some-name-cfg-0 + set +o xtrace waiting for pod/some-name-cfg-0 to be ready.OK + for i in '$(seq 0 $last_pod)' + [[ 1 -eq 2 ]] + wait_pod some-name-cfg-1 + local pod=some-name-cfg-1 + set +o xtrace waiting for pod/some-name-cfg-1 to be ready.OK + for i in '$(seq 0 $last_pod)' + [[ 2 -eq 2 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="cfg")].arbiter.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.I5oElvmInP +++ mktemp ++ local LAST_ERR=/tmp/tmp.qySsYtJgtA ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="cfg")].arbiter.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.I5oElvmInP ++ cat /tmp/tmp.qySsYtJgtA ++ rm /tmp/tmp.I5oElvmInP /tmp/tmp.qySsYtJgtA ++ return 0 + [[ '' == \t\r\u\e ]] + wait_pod some-name-cfg-2 + local pod=some-name-cfg-2 + set +o xtrace waiting for pod/some-name-cfg-2 to be ready.OK ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="cfg")].non_voting.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.pP21y5CV5f +++ mktemp ++ local LAST_ERR=/tmp/tmp.0RGX2sCjf5 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="cfg")].non_voting.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.pP21y5CV5f ++ cat /tmp/tmp.0RGX2sCjf5 ++ rm /tmp/tmp.pP21y5CV5f /tmp/tmp.0RGX2sCjf5 ++ return 0 + [[ '' == \t\r\u\e ]] + sleep 10 + [[ false == \t\r\u\e ]] + wait_for_running some-name-mongos 3 + local name=some-name-mongos + let last_pod=2 + local check_cluster_readyness=true + set_debug + [[ 1 == 1 ]] + set -o xtrace + local rs_name=mongos + local cluster_name=some-name ++ seq 0 2 + for i in '$(seq 0 $last_pod)' + [[ 0 -eq 2 ]] + wait_pod some-name-mongos-0 + local pod=some-name-mongos-0 + set +o xtrace waiting for pod/some-name-mongos-0 to be ready.OK + for i in '$(seq 0 $last_pod)' + [[ 1 -eq 2 ]] + wait_pod some-name-mongos-1 + local pod=some-name-mongos-1 + set +o xtrace waiting for pod/some-name-mongos-1 to be ready.OK + for i in '$(seq 0 $last_pod)' + [[ 2 -eq 2 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="mongos")].arbiter.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.bgM7uezS4q +++ mktemp ++ local LAST_ERR=/tmp/tmp.w7LsgJKzKz ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="mongos")].arbiter.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.bgM7uezS4q ++ cat /tmp/tmp.w7LsgJKzKz ++ rm /tmp/tmp.bgM7uezS4q /tmp/tmp.w7LsgJKzKz ++ return 0 + [[ '' == \t\r\u\e ]] + wait_pod some-name-mongos-2 + local pod=some-name-mongos-2 + set +o xtrace waiting for pod/some-name-mongos-2 to be ready.OK ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="mongos")].non_voting.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.P27war47l8 +++ mktemp ++ local LAST_ERR=/tmp/tmp.qFKCxRHKtU ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="mongos")].non_voting.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.P27war47l8 ++ cat /tmp/tmp.qFKCxRHKtU ++ rm /tmp/tmp.P27war47l8 /tmp/tmp.qFKCxRHKtU ++ return 0 + [[ '' == \t\r\u\e ]] + sleep 10 + [[ true == \t\r\u\e ]] + set +x Waiting for cluster readyness + sleep 10 + desc 'check if service and statefulset created with expected config' + set +o xtrace ----------------------------------------------------------------------------------- check if service and statefulset created with expected config ----------------------------------------------------------------------------------- + compare_kubectl statefulset/some-name-rs0 + local resource=statefulset/some-name-rs0 + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-rs0.yml + local new_result=/tmp/tmp.H4mtct1uIU/statefulset_some-name-rs0.yml + '[' -n '' -a -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-rs0-oc.yml ']' + kubectl_bin get -o yaml statefulset/some-name-rs0 + yq eval ' del(.metadata.ownerReferences[].apiVersion) | del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "NAMESPACE")) | del(.metadata.selfLink) | del(.metadata.annotations."cloud.google.com/neg") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.status) | (.. | select(tag == "!!str")) |= sub("demand-backup-sharded-16515", "NAME_SPACE") | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "extensions/v1beta1")) = "apps/v1" | (.. | select(. == "batch/v1beta1")) = "batch/v1" ' - ++ mktemp + local LAST_OUT=/tmp/tmp.g9A3Ry8XVm ++ mktemp + local LAST_ERR=/tmp/tmp.0oQf15FfBV + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml statefulset/some-name-rs0 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.g9A3Ry8XVm + cat /tmp/tmp.0oQf15FfBV + rm /tmp/tmp.g9A3Ry8XVm /tmp/tmp.0oQf15FfBV + return 0 + yq -i eval 'del(.spec.persistentVolumeClaimRetentionPolicy)' /tmp/tmp.H4mtct1uIU/statefulset_some-name-rs0.yml + version_gt 1.22 ++ bc -l ++ echo '1.26 >= 1.22' + '[' 1 -eq 1 ']' + return 0 + yq -i eval 'del(.spec.internalTrafficPolicy)' /tmp/tmp.H4mtct1uIU/statefulset_some-name-rs0.yml + yq -i eval 'del(.spec.allocateLoadBalancerNodePorts)' /tmp/tmp.H4mtct1uIU/statefulset_some-name-rs0.yml + [[ /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-rs0.yml == */cronjob* ]] + diff -u /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-rs0.yml /tmp/tmp.H4mtct1uIU/statefulset_some-name-rs0.yml + compare_kubectl statefulset/some-name-rs1 + local resource=statefulset/some-name-rs1 + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-rs1.yml + local new_result=/tmp/tmp.H4mtct1uIU/statefulset_some-name-rs1.yml + '[' -n '' -a -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-rs1-oc.yml ']' + yq eval ' del(.metadata.ownerReferences[].apiVersion) | del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "NAMESPACE")) | del(.metadata.selfLink) | del(.metadata.annotations."cloud.google.com/neg") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.status) | (.. | select(tag == "!!str")) |= sub("demand-backup-sharded-16515", "NAME_SPACE") | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "extensions/v1beta1")) = "apps/v1" | (.. | select(. == "batch/v1beta1")) = "batch/v1" ' - + kubectl_bin get -o yaml statefulset/some-name-rs1 ++ mktemp + local LAST_OUT=/tmp/tmp.Id8Ecqe4bW ++ mktemp + local LAST_ERR=/tmp/tmp.i0QX31Yv9B + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml statefulset/some-name-rs1 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.Id8Ecqe4bW + cat /tmp/tmp.i0QX31Yv9B + rm /tmp/tmp.Id8Ecqe4bW /tmp/tmp.i0QX31Yv9B + return 0 + yq -i eval 'del(.spec.persistentVolumeClaimRetentionPolicy)' /tmp/tmp.H4mtct1uIU/statefulset_some-name-rs1.yml + version_gt 1.22 ++ echo '1.26 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + yq -i eval 'del(.spec.internalTrafficPolicy)' /tmp/tmp.H4mtct1uIU/statefulset_some-name-rs1.yml + yq -i eval 'del(.spec.allocateLoadBalancerNodePorts)' /tmp/tmp.H4mtct1uIU/statefulset_some-name-rs1.yml + [[ /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-rs1.yml == */cronjob* ]] + diff -u /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-rs1.yml /tmp/tmp.H4mtct1uIU/statefulset_some-name-rs1.yml + compare_kubectl statefulset/some-name-rs2 + local resource=statefulset/some-name-rs2 + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-rs2.yml + local new_result=/tmp/tmp.H4mtct1uIU/statefulset_some-name-rs2.yml + '[' -n '' -a -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-rs2-oc.yml ']' + kubectl_bin get -o yaml statefulset/some-name-rs2 ++ mktemp + local LAST_OUT=/tmp/tmp.cxamH1c8IA ++ mktemp + local LAST_ERR=/tmp/tmp.f8kDdJycV4 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml statefulset/some-name-rs2 + yq eval ' del(.metadata.ownerReferences[].apiVersion) | del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "NAMESPACE")) | del(.metadata.selfLink) | del(.metadata.annotations."cloud.google.com/neg") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.status) | (.. | select(tag == "!!str")) |= sub("demand-backup-sharded-16515", "NAME_SPACE") | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "extensions/v1beta1")) = "apps/v1" | (.. | select(. == "batch/v1beta1")) = "batch/v1" ' - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.cxamH1c8IA + cat /tmp/tmp.f8kDdJycV4 + rm /tmp/tmp.cxamH1c8IA /tmp/tmp.f8kDdJycV4 + return 0 + yq -i eval 'del(.spec.persistentVolumeClaimRetentionPolicy)' /tmp/tmp.H4mtct1uIU/statefulset_some-name-rs2.yml + version_gt 1.22 ++ bc -l ++ echo '1.26 >= 1.22' + '[' 1 -eq 1 ']' + return 0 + yq -i eval 'del(.spec.internalTrafficPolicy)' /tmp/tmp.H4mtct1uIU/statefulset_some-name-rs2.yml + yq -i eval 'del(.spec.allocateLoadBalancerNodePorts)' /tmp/tmp.H4mtct1uIU/statefulset_some-name-rs2.yml + [[ /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-rs2.yml == */cronjob* ]] + diff -u /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-rs2.yml /tmp/tmp.H4mtct1uIU/statefulset_some-name-rs2.yml + compare_kubectl statefulset/some-name-cfg + local resource=statefulset/some-name-cfg + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-cfg.yml + local new_result=/tmp/tmp.H4mtct1uIU/statefulset_some-name-cfg.yml + '[' -n '' -a -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-cfg-oc.yml ']' + yq eval ' del(.metadata.ownerReferences[].apiVersion) | del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "NAMESPACE")) | del(.metadata.selfLink) | del(.metadata.annotations."cloud.google.com/neg") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.status) | (.. | select(tag == "!!str")) |= sub("demand-backup-sharded-16515", "NAME_SPACE") | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "extensions/v1beta1")) = "apps/v1" | (.. | select(. == "batch/v1beta1")) = "batch/v1" ' - + kubectl_bin get -o yaml statefulset/some-name-cfg ++ mktemp + local LAST_OUT=/tmp/tmp.id7CJOn9Eq ++ mktemp + local LAST_ERR=/tmp/tmp.R11lJWq0eq + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml statefulset/some-name-cfg + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.id7CJOn9Eq + cat /tmp/tmp.R11lJWq0eq + rm /tmp/tmp.id7CJOn9Eq /tmp/tmp.R11lJWq0eq + return 0 + yq -i eval 'del(.spec.persistentVolumeClaimRetentionPolicy)' /tmp/tmp.H4mtct1uIU/statefulset_some-name-cfg.yml + version_gt 1.22 ++ echo '1.26 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + yq -i eval 'del(.spec.internalTrafficPolicy)' /tmp/tmp.H4mtct1uIU/statefulset_some-name-cfg.yml + yq -i eval 'del(.spec.allocateLoadBalancerNodePorts)' /tmp/tmp.H4mtct1uIU/statefulset_some-name-cfg.yml + [[ /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-cfg.yml == */cronjob* ]] + diff -u /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-cfg.yml /tmp/tmp.H4mtct1uIU/statefulset_some-name-cfg.yml + compare_kubectl statefulset/some-name-mongos '' + local resource=statefulset/some-name-mongos + local postfix= + local expected_result=/mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-mongos.yml + local new_result=/tmp/tmp.H4mtct1uIU/statefulset_some-name-mongos.yml + '[' -n '' -a -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-mongos-oc.yml ']' + kubectl_bin get -o yaml statefulset/some-name-mongos + yq eval ' del(.metadata.ownerReferences[].apiVersion) | del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "NAMESPACE")) | del(.metadata.selfLink) | del(.metadata.annotations."cloud.google.com/neg") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.status) | (.. | select(tag == "!!str")) |= sub("demand-backup-sharded-16515", "NAME_SPACE") | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "extensions/v1beta1")) = "apps/v1" | (.. | select(. == "batch/v1beta1")) = "batch/v1" ' - ++ mktemp + local LAST_OUT=/tmp/tmp.lJIqelBMut ++ mktemp + local LAST_ERR=/tmp/tmp.UmI9CmP51A + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml statefulset/some-name-mongos + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.lJIqelBMut + cat /tmp/tmp.UmI9CmP51A + rm /tmp/tmp.lJIqelBMut /tmp/tmp.UmI9CmP51A + return 0 + yq -i eval 'del(.spec.persistentVolumeClaimRetentionPolicy)' /tmp/tmp.H4mtct1uIU/statefulset_some-name-mongos.yml + version_gt 1.22 ++ echo '1.26 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + yq -i eval 'del(.spec.internalTrafficPolicy)' /tmp/tmp.H4mtct1uIU/statefulset_some-name-mongos.yml + yq -i eval 'del(.spec.allocateLoadBalancerNodePorts)' /tmp/tmp.H4mtct1uIU/statefulset_some-name-mongos.yml + [[ /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-mongos.yml == */cronjob* ]] + diff -u /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-mongos.yml /tmp/tmp.H4mtct1uIU/statefulset_some-name-mongos.yml + kubectl_bin apply -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/conf/mongos-secret.yml ++ mktemp + local LAST_OUT=/tmp/tmp.BB2akUN1Uu ++ mktemp + local LAST_ERR=/tmp/tmp.UziUgGJeVK + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/conf/mongos-secret.yml + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.BB2akUN1Uu secret/some-name-mongos created + cat /tmp/tmp.UziUgGJeVK + rm /tmp/tmp.BB2akUN1Uu /tmp/tmp.UziUgGJeVK + return 0 + sleep 10 + wait_for_running some-name-mongos 3 + local name=some-name-mongos + let last_pod=2 + local check_cluster_readyness=true + set_debug + [[ 1 == 1 ]] + set -o xtrace + local rs_name=mongos + local cluster_name=some-name ++ seq 0 2 + for i in '$(seq 0 $last_pod)' + [[ 0 -eq 2 ]] + wait_pod some-name-mongos-0 + local pod=some-name-mongos-0 + set +o xtrace waiting for pod/some-name-mongos-0 to be ready.OK + for i in '$(seq 0 $last_pod)' + [[ 1 -eq 2 ]] + wait_pod some-name-mongos-1 + local pod=some-name-mongos-1 + set +o xtrace waiting for pod/some-name-mongos-1 to be ready.OK + for i in '$(seq 0 $last_pod)' + [[ 2 -eq 2 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="mongos")].arbiter.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.n02ujkB7Gv +++ mktemp ++ local LAST_ERR=/tmp/tmp.LapKVQVUKG ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="mongos")].arbiter.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.n02ujkB7Gv ++ cat /tmp/tmp.LapKVQVUKG ++ rm /tmp/tmp.n02ujkB7Gv /tmp/tmp.LapKVQVUKG ++ return 0 + [[ '' == \t\r\u\e ]] + wait_pod some-name-mongos-2 + local pod=some-name-mongos-2 + set +o xtrace waiting for pod/some-name-mongos-2 to be ready.OK ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="mongos")].non_voting.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.uTIsXB34pO +++ mktemp ++ local LAST_ERR=/tmp/tmp.Z7Hm0GXalV ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="mongos")].non_voting.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.uTIsXB34pO ++ cat /tmp/tmp.Z7Hm0GXalV ++ rm /tmp/tmp.uTIsXB34pO /tmp/tmp.Z7Hm0GXalV ++ return 0 + [[ '' == \t\r\u\e ]] + sleep 10 + [[ true == \t\r\u\e ]] + set +x Waiting for cluster readyness................................................................................................ + compare_kubectl statefulset/some-name-mongos -secret + local resource=statefulset/some-name-mongos + local postfix=-secret + local expected_result=/mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-mongos-secret.yml + local new_result=/tmp/tmp.H4mtct1uIU/statefulset_some-name-mongos.yml + '[' -n '' -a -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-mongos-secret-oc.yml ']' + kubectl_bin get -o yaml statefulset/some-name-mongos + yq eval ' del(.metadata.ownerReferences[].apiVersion) | del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "NAMESPACE")) | del(.metadata.selfLink) | del(.metadata.annotations."cloud.google.com/neg") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.status) | (.. | select(tag == "!!str")) |= sub("demand-backup-sharded-16515", "NAME_SPACE") | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "extensions/v1beta1")) = "apps/v1" | (.. | select(. == "batch/v1beta1")) = "batch/v1" ' - ++ mktemp + local LAST_OUT=/tmp/tmp.KqoLvFOZzg ++ mktemp + local LAST_ERR=/tmp/tmp.46tP1qAcru + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml statefulset/some-name-mongos + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.KqoLvFOZzg + cat /tmp/tmp.46tP1qAcru + rm /tmp/tmp.KqoLvFOZzg /tmp/tmp.46tP1qAcru + return 0 + yq -i eval 'del(.spec.persistentVolumeClaimRetentionPolicy)' /tmp/tmp.H4mtct1uIU/statefulset_some-name-mongos.yml + version_gt 1.22 ++ echo '1.26 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + yq -i eval 'del(.spec.internalTrafficPolicy)' /tmp/tmp.H4mtct1uIU/statefulset_some-name-mongos.yml + yq -i eval 'del(.spec.allocateLoadBalancerNodePorts)' /tmp/tmp.H4mtct1uIU/statefulset_some-name-mongos.yml + [[ /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-mongos-secret.yml == */cronjob* ]] + diff -u /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-mongos-secret.yml /tmp/tmp.H4mtct1uIU/statefulset_some-name-mongos.yml + desc 'write data, read from all' + set +o xtrace ----------------------------------------------------------------------------------- write data, read from all ----------------------------------------------------------------------------------- + run_mongos 'db.createUser({user:"myApp",pwd:"myPass",roles:[{db:"myApp",role:"readWrite"},{db:"myApp1",role:"readWrite"},{db:"myApp2",role:"readWrite"}]})' userAdmin:userAdmin123456@some-name-mongos.demand-backup-sharded-16515 + local 'command=db.createUser({user:"myApp",pwd:"myPass",roles:[{db:"myApp",role:"readWrite"},{db:"myApp1",role:"readWrite"},{db:"myApp2",role:"readWrite"}]})' + local uri=userAdmin:userAdmin123456@some-name-mongos.demand-backup-sharded-16515 + local driver=mongodb + local suffix=.svc.cluster.local ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.u0Oz446Ynp +++ mktemp ++ local LAST_ERR=/tmp/tmp.Pj5pNtQxtI ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.u0Oz446Ynp ++ cat /tmp/tmp.Pj5pNtQxtI ++ rm /tmp/tmp.u0Oz446Ynp /tmp/tmp.Pj5pNtQxtI ++ return 0 + local client_container=psmdb-client-7469665986-4v9w6 + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''db.createUser({user:"myApp",pwd:"myPass",roles:[{db:"myApp",role:"readWrite"},{db:"myApp1",role:"readWrite"},{db:"myApp2",role:"readWrite"}]})\n'\'' | mongo mongodb://userAdmin:userAdmin123456@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.b8Qdm6beP6 ++ mktemp + local LAST_ERR=/tmp/tmp.3pP75EAE0A + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''db.createUser({user:"myApp",pwd:"myPass",roles:[{db:"myApp",role:"readWrite"},{db:"myApp1",role:"readWrite"},{db:"myApp2",role:"readWrite"}]})\n'\'' | mongo mongodb://userAdmin:userAdmin123456@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.b8Qdm6beP6 Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-16515.svc.cluster.local:27017/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("b5de5b0c-1bc1-49d1-9214-03b240b5e66c") } Percona Server for MongoDB server version: v7.0.8-5 WARNING: shell and server versions do not match Successfully added user: { "user" : "myApp", "roles" : [ { "db" : "myApp", "role" : "readWrite" }, { "db" : "myApp1", "role" : "readWrite" }, { "db" : "myApp2", "role" : "readWrite" } ] } bye + cat /tmp/tmp.3pP75EAE0A + rm /tmp/tmp.b8Qdm6beP6 /tmp/tmp.3pP75EAE0A + return 0 + run_mongos 'sh.enableSharding("myApp","rs0")' clusterAdmin:clusterAdmin123456@some-name-mongos.demand-backup-sharded-16515 + local 'command=sh.enableSharding("myApp","rs0")' + local uri=clusterAdmin:clusterAdmin123456@some-name-mongos.demand-backup-sharded-16515 + local driver=mongodb + local suffix=.svc.cluster.local ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.FkLJFvLW6r +++ mktemp ++ local LAST_ERR=/tmp/tmp.8Njw9IulEf ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.FkLJFvLW6r ++ cat /tmp/tmp.8Njw9IulEf ++ rm /tmp/tmp.FkLJFvLW6r /tmp/tmp.8Njw9IulEf ++ return 0 + local client_container=psmdb-client-7469665986-4v9w6 + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''sh.enableSharding("myApp","rs0")\n'\'' | mongo mongodb://clusterAdmin:clusterAdmin123456@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.JBQUYNZ7jI ++ mktemp + local LAST_ERR=/tmp/tmp.A997AUYL0d + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''sh.enableSharding("myApp","rs0")\n'\'' | mongo mongodb://clusterAdmin:clusterAdmin123456@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.JBQUYNZ7jI Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-16515.svc.cluster.local:27017/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("8ef653a0-af14-44f7-90d2-81e0f729dbc8") } Percona Server for MongoDB server version: v7.0.8-5 WARNING: shell and server versions do not match { "ok" : 1, "$clusterTime" : { "clusterTime" : Timestamp(1716989652, 16), "signature" : { "hash" : BinData(0,"uBaV4gKEr8p7Jh9YKsaOfXSYARs="), "keyId" : NumberLong("7374412650563764246") } }, "operationTime" : Timestamp(1716989652, 10) } bye + cat /tmp/tmp.A997AUYL0d + rm /tmp/tmp.JBQUYNZ7jI /tmp/tmp.A997AUYL0d + return 0 + run_mongos 'sh.enableSharding("myApp1","rs1")' clusterAdmin:clusterAdmin123456@some-name-mongos.demand-backup-sharded-16515 + local 'command=sh.enableSharding("myApp1","rs1")' + local uri=clusterAdmin:clusterAdmin123456@some-name-mongos.demand-backup-sharded-16515 + local driver=mongodb + local suffix=.svc.cluster.local ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.5ijbtEo1Q2 +++ mktemp ++ local LAST_ERR=/tmp/tmp.JjkzLXzNX9 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.5ijbtEo1Q2 ++ cat /tmp/tmp.JjkzLXzNX9 ++ rm /tmp/tmp.5ijbtEo1Q2 /tmp/tmp.JjkzLXzNX9 ++ return 0 + local client_container=psmdb-client-7469665986-4v9w6 + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''sh.enableSharding("myApp1","rs1")\n'\'' | mongo mongodb://clusterAdmin:clusterAdmin123456@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.xk9Bth3ecT ++ mktemp + local LAST_ERR=/tmp/tmp.4oPluyNIhn + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''sh.enableSharding("myApp1","rs1")\n'\'' | mongo mongodb://clusterAdmin:clusterAdmin123456@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.xk9Bth3ecT Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-16515.svc.cluster.local:27017/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("b99e0b7f-76df-4a80-86eb-3bb1e01a9ebf") } Percona Server for MongoDB server version: v7.0.8-5 WARNING: shell and server versions do not match { "ok" : 1, "$clusterTime" : { "clusterTime" : Timestamp(1716989655, 11), "signature" : { "hash" : BinData(0,"5NymyprJsitWM17ZdjTA/xBrJFk="), "keyId" : NumberLong("7374412650563764246") } }, "operationTime" : Timestamp(1716989655, 6) } bye + cat /tmp/tmp.4oPluyNIhn + rm /tmp/tmp.xk9Bth3ecT /tmp/tmp.4oPluyNIhn + return 0 + run_mongos 'sh.enableSharding("myApp2","rs2")' clusterAdmin:clusterAdmin123456@some-name-mongos.demand-backup-sharded-16515 + local 'command=sh.enableSharding("myApp2","rs2")' + local uri=clusterAdmin:clusterAdmin123456@some-name-mongos.demand-backup-sharded-16515 + local driver=mongodb + local suffix=.svc.cluster.local ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.xewLtQRE7H +++ mktemp ++ local LAST_ERR=/tmp/tmp.Ctf8f1yniY ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.xewLtQRE7H ++ cat /tmp/tmp.Ctf8f1yniY ++ rm /tmp/tmp.xewLtQRE7H /tmp/tmp.Ctf8f1yniY ++ return 0 + local client_container=psmdb-client-7469665986-4v9w6 + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''sh.enableSharding("myApp2","rs2")\n'\'' | mongo mongodb://clusterAdmin:clusterAdmin123456@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.jNF21sXgsR ++ mktemp + local LAST_ERR=/tmp/tmp.y7mL5QvfuU + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''sh.enableSharding("myApp2","rs2")\n'\'' | mongo mongodb://clusterAdmin:clusterAdmin123456@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.jNF21sXgsR Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-16515.svc.cluster.local:27017/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("5e29b7de-36e2-40e8-86c3-d394e8708f1b") } Percona Server for MongoDB server version: v7.0.8-5 WARNING: shell and server versions do not match { "ok" : 1, "$clusterTime" : { "clusterTime" : Timestamp(1716989658, 7), "signature" : { "hash" : BinData(0,"zHs0Bd+J+8f8U2ug3mQ1W7AINYs="), "keyId" : NumberLong("7374412650563764246") } }, "operationTime" : Timestamp(1716989658, 2) } bye + cat /tmp/tmp.y7mL5QvfuU + rm /tmp/tmp.jNF21sXgsR /tmp/tmp.y7mL5QvfuU + return 0 + insert_data_mongos 100500 myApp + local data=100500 + local db_name=myApp + local flags= + run_mongos 'use myApp\n db.test.insert({ x: 100500 })' myApp:myPass@some-name-mongos.demand-backup-sharded-16515 '' '' '' + local 'command=use myApp\n db.test.insert({ x: 100500 })' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local driver=mongodb + local suffix=.svc.cluster.local ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ztkiZJVZ4u +++ mktemp ++ local LAST_ERR=/tmp/tmp.yqh0bNT1sE ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.ztkiZJVZ4u ++ cat /tmp/tmp.yqh0bNT1sE ++ rm /tmp/tmp.ztkiZJVZ4u /tmp/tmp.yqh0bNT1sE ++ return 0 + local client_container=psmdb-client-7469665986-4v9w6 + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp\n db.test.insert({ x: 100500 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.Z8QnrcAEwF ++ mktemp + local LAST_ERR=/tmp/tmp.NKdHGqR0fz + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp\n db.test.insert({ x: 100500 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.Z8QnrcAEwF Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-16515.svc.cluster.local:27017/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("05445b5e-483f-42a0-8f3c-080edc5a9537") } Percona Server for MongoDB server version: v7.0.8-5 WARNING: shell and server versions do not match switched to db myApp WriteResult({ "nInserted" : 1 }) bye + cat /tmp/tmp.NKdHGqR0fz + rm /tmp/tmp.Z8QnrcAEwF /tmp/tmp.NKdHGqR0fz + return 0 + insert_data_mongos 100500 myApp1 + local data=100500 + local db_name=myApp1 + local flags= + run_mongos 'use myApp1\n db.test.insert({ x: 100500 })' myApp:myPass@some-name-mongos.demand-backup-sharded-16515 '' '' '' + local 'command=use myApp1\n db.test.insert({ x: 100500 })' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local driver=mongodb + local suffix=.svc.cluster.local ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.vk3uXYXrDZ +++ mktemp ++ local LAST_ERR=/tmp/tmp.cZFTiVGAJp ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.vk3uXYXrDZ ++ cat /tmp/tmp.cZFTiVGAJp ++ rm /tmp/tmp.vk3uXYXrDZ /tmp/tmp.cZFTiVGAJp ++ return 0 + local client_container=psmdb-client-7469665986-4v9w6 + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp1\n db.test.insert({ x: 100500 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.lvr7GfQpzw ++ mktemp + local LAST_ERR=/tmp/tmp.jynpbVD508 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp1\n db.test.insert({ x: 100500 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.lvr7GfQpzw Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-16515.svc.cluster.local:27017/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("d69d6db3-6f7b-4e6e-9fcb-f5bec6e7e792") } Percona Server for MongoDB server version: v7.0.8-5 WARNING: shell and server versions do not match switched to db myApp1 WriteResult({ "nInserted" : 1 }) bye + cat /tmp/tmp.jynpbVD508 + rm /tmp/tmp.lvr7GfQpzw /tmp/tmp.jynpbVD508 + return 0 + insert_data_mongos 100500 myApp2 + local data=100500 + local db_name=myApp2 + local flags= + run_mongos 'use myApp2\n db.test.insert({ x: 100500 })' myApp:myPass@some-name-mongos.demand-backup-sharded-16515 '' '' '' + local 'command=use myApp2\n db.test.insert({ x: 100500 })' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local driver=mongodb + local suffix=.svc.cluster.local ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ZYlkJf4294 +++ mktemp ++ local LAST_ERR=/tmp/tmp.oyUXKhlu7Q ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.ZYlkJf4294 ++ cat /tmp/tmp.oyUXKhlu7Q ++ rm /tmp/tmp.ZYlkJf4294 /tmp/tmp.oyUXKhlu7Q ++ return 0 + local client_container=psmdb-client-7469665986-4v9w6 + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp2\n db.test.insert({ x: 100500 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.cAe6FelAz1 ++ mktemp + local LAST_ERR=/tmp/tmp.Krh9wpkpY5 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp2\n db.test.insert({ x: 100500 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.cAe6FelAz1 Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-16515.svc.cluster.local:27017/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("5c72df10-8676-4497-8c58-5e1b342519c8") } Percona Server for MongoDB server version: v7.0.8-5 WARNING: shell and server versions do not match switched to db myApp2 WriteResult({ "nInserted" : 1 }) bye + cat /tmp/tmp.Krh9wpkpY5 + rm /tmp/tmp.cAe6FelAz1 /tmp/tmp.Krh9wpkpY5 + return 0 + minikube_sleep + sleep_time=10 + [[ '' == 1 ]] + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local postfix= + local suffix= + local database=myApp + local collection=test + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' + run_mongos 'use myApp\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-16515 mongodb '' + local 'command=use myApp\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local driver=mongodb + local suffix=.svc.cluster.local ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.qjopP1TGMS +++ mktemp ++ local LAST_ERR=/tmp/tmp.6wIfmZp5t7 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.qjopP1TGMS ++ cat /tmp/tmp.6wIfmZp5t7 ++ rm /tmp/tmp.qjopP1TGMS /tmp/tmp.6wIfmZp5t7 ++ return 0 + local client_container=psmdb-client-7469665986-4v9w6 + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.No6j2wWC80 ++ mktemp + local LAST_ERR=/tmp/tmp.ASDdKv2NN1 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.No6j2wWC80 + cat /tmp/tmp.ASDdKv2NN1 + rm /tmp/tmp.No6j2wWC80 /tmp/tmp.ASDdKv2NN1 + return 0 + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/compare/find.json /tmp/tmp.H4mtct1uIU/find + wait_backup_agent some-name-rs0-0 + local agent_pod=some-name-rs0-0 + set +o xtrace some-name-rs0-0 + wait_backup_agent some-name-rs0-1 + local agent_pod=some-name-rs0-1 + set +o xtrace some-name-rs0-1 + wait_backup_agent some-name-rs0-2 + local agent_pod=some-name-rs0-2 + set +o xtrace some-name-rs0-2 + wait_backup_agent some-name-rs1-0 + local agent_pod=some-name-rs1-0 + set +o xtrace some-name-rs1-0 + wait_backup_agent some-name-rs1-1 + local agent_pod=some-name-rs1-1 + set +o xtrace some-name-rs1-1 + wait_backup_agent some-name-rs1-2 + local agent_pod=some-name-rs1-2 + set +o xtrace some-name-rs1-2 + wait_backup_agent some-name-rs2-0 + local agent_pod=some-name-rs2-0 + set +o xtrace some-name-rs2-0 + wait_backup_agent some-name-rs2-1 + local agent_pod=some-name-rs2-1 + set +o xtrace some-name-rs2-1 + wait_backup_agent some-name-rs2-2 + local agent_pod=some-name-rs2-2 + set +o xtrace some-name-rs2-2 + backup_name_aws=backup-aws-s3 + backup_name_minio=backup-minio + backup_name_gcp=backup-gcp-cs + backup_name_azure=backup-azure-blob + desc 'run backups' + set +o xtrace ----------------------------------------------------------------------------------- run backups ----------------------------------------------------------------------------------- + run_backup minio + local storage=minio + local backup_name=backup-minio + desc 'run backup backup-minio' + set +o xtrace ----------------------------------------------------------------------------------- run backup backup-minio ----------------------------------------------------------------------------------- + yq eval '.metadata.name = "backup-minio" | .spec.storageName = "minio"' /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/conf/backup-minio.yml + kubectl_bin apply -f - ++ mktemp + local LAST_OUT=/tmp/tmp.xQ5gZGSUPr ++ mktemp + local LAST_ERR=/tmp/tmp.nkSVWnl3Hf + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.xQ5gZGSUPr perconaservermongodbbackup.psmdb.percona.com/backup-minio created + cat /tmp/tmp.nkSVWnl3Hf + rm /tmp/tmp.xQ5gZGSUPr /tmp/tmp.nkSVWnl3Hf + return 0 + '[' -z '' ']' + run_backup aws-s3 + local storage=aws-s3 + local backup_name=backup-aws-s3 + desc 'run backup backup-aws-s3' + set +o xtrace ----------------------------------------------------------------------------------- run backup backup-aws-s3 ----------------------------------------------------------------------------------- + kubectl_bin apply -f - + yq eval '.metadata.name = "backup-aws-s3" | .spec.storageName = "aws-s3"' /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/conf/backup-aws-s3.yml ++ mktemp + local LAST_OUT=/tmp/tmp.YQ4bDGj6VA ++ mktemp + local LAST_ERR=/tmp/tmp.8dCGOV1DT1 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.YQ4bDGj6VA perconaservermongodbbackup.psmdb.percona.com/backup-aws-s3 created + cat /tmp/tmp.8dCGOV1DT1 + rm /tmp/tmp.YQ4bDGj6VA /tmp/tmp.8dCGOV1DT1 + return 0 + run_backup gcp-cs + local storage=gcp-cs + local backup_name=backup-gcp-cs + desc 'run backup backup-gcp-cs' + set +o xtrace ----------------------------------------------------------------------------------- run backup backup-gcp-cs ----------------------------------------------------------------------------------- + kubectl_bin apply -f - + yq eval '.metadata.name = "backup-gcp-cs" | .spec.storageName = "gcp-cs"' /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/conf/backup-gcp-cs.yml ++ mktemp + local LAST_OUT=/tmp/tmp.iVTfKoBdDN ++ mktemp + local LAST_ERR=/tmp/tmp.95qhSa0bKE + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.iVTfKoBdDN perconaservermongodbbackup.psmdb.percona.com/backup-gcp-cs created + cat /tmp/tmp.95qhSa0bKE + rm /tmp/tmp.iVTfKoBdDN /tmp/tmp.95qhSa0bKE + return 0 + run_backup azure-blob + local storage=azure-blob + local backup_name=backup-azure-blob + desc 'run backup backup-azure-blob' + set +o xtrace ----------------------------------------------------------------------------------- run backup backup-azure-blob ----------------------------------------------------------------------------------- + yq eval '.metadata.name = "backup-azure-blob" | .spec.storageName = "azure-blob"' /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/conf/backup-azure-blob.yml + kubectl_bin apply -f - ++ mktemp + local LAST_OUT=/tmp/tmp.DNCfJxX4wu ++ mktemp + local LAST_ERR=/tmp/tmp.HYKWCE9jYp + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.DNCfJxX4wu perconaservermongodbbackup.psmdb.percona.com/backup-azure-blob created + cat /tmp/tmp.HYKWCE9jYp + rm /tmp/tmp.DNCfJxX4wu /tmp/tmp.HYKWCE9jYp + return 0 + wait_backup backup-aws-s3 + local backup_name=backup-aws-s3 + set +o xtrace backup-aws-s3......................................... + wait_backup backup-gcp-cs + local backup_name=backup-gcp-cs + set +o xtrace backup-gcp-cs.................. + wait_backup backup-azure-blob + local backup_name=backup-azure-blob + set +o xtrace backup-azure-blob..................... + wait_backup backup-minio + local backup_name=backup-minio + set +o xtrace backup-minio. + sleep 5 + '[' -z '' ']' + desc 'check backup and restore -- aws-s3' + set +o xtrace ----------------------------------------------------------------------------------- check backup and restore -- aws-s3 ----------------------------------------------------------------------------------- ++ get_backup_dest backup-aws-s3 ++ local backup_name=backup-aws-s3 ++ kubectl_bin get psmdb-backup backup-aws-s3 -o 'jsonpath={.status.destination}' ++ sed -e 's/.json$//' ++ sed 's|s3://||' +++ mktemp ++ sed 's|azure://||' ++ local LAST_OUT=/tmp/tmp.Nd9MxRw0cV +++ mktemp ++ local LAST_ERR=/tmp/tmp.NA462PeBPt ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb-backup backup-aws-s3 -o 'jsonpath={.status.destination}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.Nd9MxRw0cV ++ cat /tmp/tmp.NA462PeBPt ++ rm /tmp/tmp.Nd9MxRw0cV /tmp/tmp.NA462PeBPt ++ return 0 + backup_dest_aws=operator-testing/psmdb-demand-backup-sharded/2024-05-29T13:35:51Z + gunzip + curl -s https://s3.amazonaws.com/operator-testing/psmdb-demand-backup-sharded/2024-05-29T13:35:51Z/rs0/myApp.test.gz + gunzip + curl -s https://s3.amazonaws.com/operator-testing/psmdb-demand-backup-sharded/2024-05-29T13:35:51Z/rs1/myApp1.test.gz + curl -s https://s3.amazonaws.com/operator-testing/psmdb-demand-backup-sharded/2024-05-29T13:35:51Z/rs2/myApp2.test.gz + gunzip + insert_data_mongos 100501 myApp + local data=100501 + local db_name=myApp + local flags= + run_mongos 'use myApp\n db.test.insert({ x: 100501 })' myApp:myPass@some-name-mongos.demand-backup-sharded-16515 '' '' '' + local 'command=use myApp\n db.test.insert({ x: 100501 })' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local driver=mongodb + local suffix=.svc.cluster.local ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ZlsMnSphFt +++ mktemp ++ local LAST_ERR=/tmp/tmp.Ox70A5Gh4P ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.ZlsMnSphFt ++ cat /tmp/tmp.Ox70A5Gh4P ++ rm /tmp/tmp.ZlsMnSphFt /tmp/tmp.Ox70A5Gh4P ++ return 0 + local client_container=psmdb-client-7469665986-4v9w6 + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.WJLJg9sG0S ++ mktemp + local LAST_ERR=/tmp/tmp.GEuo0Eh8EB + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.WJLJg9sG0S Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-16515.svc.cluster.local:27017/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("2f8331d0-77e4-4c85-b65d-942e66e72f28") } Percona Server for MongoDB server version: v7.0.8-5 WARNING: shell and server versions do not match switched to db myApp WriteResult({ "nInserted" : 1 }) bye + cat /tmp/tmp.GEuo0Eh8EB + rm /tmp/tmp.WJLJg9sG0S /tmp/tmp.GEuo0Eh8EB + return 0 + insert_data_mongos 100501 myApp1 + local data=100501 + local db_name=myApp1 + local flags= + run_mongos 'use myApp1\n db.test.insert({ x: 100501 })' myApp:myPass@some-name-mongos.demand-backup-sharded-16515 '' '' '' + local 'command=use myApp1\n db.test.insert({ x: 100501 })' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local driver=mongodb + local suffix=.svc.cluster.local ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.yqMbviMKX4 +++ mktemp ++ local LAST_ERR=/tmp/tmp.KMN47qZlrq ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.yqMbviMKX4 ++ cat /tmp/tmp.KMN47qZlrq ++ rm /tmp/tmp.yqMbviMKX4 /tmp/tmp.KMN47qZlrq ++ return 0 + local client_container=psmdb-client-7469665986-4v9w6 + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp1\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.6xLzNluK4z ++ mktemp + local LAST_ERR=/tmp/tmp.GNk2oFxzw2 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp1\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.6xLzNluK4z Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-16515.svc.cluster.local:27017/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("960d00c5-bc36-41a8-a024-3f2fd3954f73") } Percona Server for MongoDB server version: v7.0.8-5 WARNING: shell and server versions do not match switched to db myApp1 WriteResult({ "nInserted" : 1 }) bye + cat /tmp/tmp.GNk2oFxzw2 + rm /tmp/tmp.6xLzNluK4z /tmp/tmp.GNk2oFxzw2 + return 0 + insert_data_mongos 100501 myApp2 + local data=100501 + local db_name=myApp2 + local flags= + run_mongos 'use myApp2\n db.test.insert({ x: 100501 })' myApp:myPass@some-name-mongos.demand-backup-sharded-16515 '' '' '' + local 'command=use myApp2\n db.test.insert({ x: 100501 })' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local driver=mongodb + local suffix=.svc.cluster.local ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.6sr0TF4Lqd +++ mktemp ++ local LAST_ERR=/tmp/tmp.Etp3J5bE1c ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.6sr0TF4Lqd ++ cat /tmp/tmp.Etp3J5bE1c ++ rm /tmp/tmp.6sr0TF4Lqd /tmp/tmp.Etp3J5bE1c ++ return 0 + local client_container=psmdb-client-7469665986-4v9w6 + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp2\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.P5STScMLNr ++ mktemp + local LAST_ERR=/tmp/tmp.P4X4BZzSyz + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp2\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.P5STScMLNr Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-16515.svc.cluster.local:27017/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("fa792176-4503-43dc-a8a2-567a34aa3e4f") } Percona Server for MongoDB server version: v7.0.8-5 WARNING: shell and server versions do not match switched to db myApp2 WriteResult({ "nInserted" : 1 }) bye + cat /tmp/tmp.P4X4BZzSyz + rm /tmp/tmp.P5STScMLNr /tmp/tmp.P4X4BZzSyz + return 0 + check_data -2nd + local postfix=-2nd ++ seq 0 2 + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-16515 -2nd .svc.cluster.local myApp test + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local postfix=-2nd + local suffix=.svc.cluster.local + local database=myApp + local collection=test + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + run_mongos 'use myApp\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-16515 mongodb .svc.cluster.local + local 'command=use myApp\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local driver=mongodb + local suffix=.svc.cluster.local ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' ++ local LAST_OUT=/tmp/tmp.athy7MeQc0 +++ mktemp ++ local LAST_ERR=/tmp/tmp.ga4D5oQtjs ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.athy7MeQc0 ++ cat /tmp/tmp.ga4D5oQtjs ++ rm /tmp/tmp.athy7MeQc0 /tmp/tmp.ga4D5oQtjs ++ return 0 + local client_container=psmdb-client-7469665986-4v9w6 + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.SoJ5XsOGan ++ mktemp + local LAST_ERR=/tmp/tmp.KU9OKvoy4j + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.SoJ5XsOGan + cat /tmp/tmp.KU9OKvoy4j + rm /tmp/tmp.SoJ5XsOGan /tmp/tmp.KU9OKvoy4j + return 0 + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/compare/find-2nd.json /tmp/tmp.H4mtct1uIU/find-2nd + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-16515 -2nd1 .svc.cluster.local myApp1 test + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local postfix=-2nd1 + local suffix=.svc.cluster.local + local database=myApp1 + local collection=test + run_mongos 'use myApp1\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-16515 mongodb .svc.cluster.local + local 'command=use myApp1\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local driver=mongodb + local suffix=.svc.cluster.local + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.XzVcvy4ksp +++ mktemp ++ local LAST_ERR=/tmp/tmp.msmeTebgCY ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.XzVcvy4ksp ++ cat /tmp/tmp.msmeTebgCY ++ rm /tmp/tmp.XzVcvy4ksp /tmp/tmp.msmeTebgCY ++ return 0 + local client_container=psmdb-client-7469665986-4v9w6 + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp1\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.jqmz2Qstxf ++ mktemp + local LAST_ERR=/tmp/tmp.fbjbEdZ1G2 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp1\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.jqmz2Qstxf + cat /tmp/tmp.fbjbEdZ1G2 + rm /tmp/tmp.jqmz2Qstxf /tmp/tmp.fbjbEdZ1G2 + return 0 + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/compare/find-2nd1.json /tmp/tmp.H4mtct1uIU/find-2nd1 + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-16515 -2nd2 .svc.cluster.local myApp2 test + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local postfix=-2nd2 + local suffix=.svc.cluster.local + local database=myApp2 + local collection=test + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + run_mongos 'use myApp2\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-16515 mongodb .svc.cluster.local + local 'command=use myApp2\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local driver=mongodb + local suffix=.svc.cluster.local + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.YXFG0kCafO +++ mktemp ++ local LAST_ERR=/tmp/tmp.1kDRc4ACTF ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.YXFG0kCafO ++ cat /tmp/tmp.1kDRc4ACTF ++ rm /tmp/tmp.YXFG0kCafO /tmp/tmp.1kDRc4ACTF ++ return 0 + local client_container=psmdb-client-7469665986-4v9w6 + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp2\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.ymwX3nbUhC ++ mktemp + local LAST_ERR=/tmp/tmp.j1zZLZZkhg + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp2\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.ymwX3nbUhC + cat /tmp/tmp.j1zZLZZkhg + rm /tmp/tmp.ymwX3nbUhC /tmp/tmp.j1zZLZZkhg + return 0 + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/compare/find-2nd2.json /tmp/tmp.H4mtct1uIU/find-2nd2 + run_restore backup-aws-s3 + local backup_name=backup-aws-s3 + /usr/bin/sed -e 's/backupName:/backupName: backup-aws-s3/' + cat /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/conf/restore.yml + /usr/bin/sed -e 's/name:/name: restore-backup-aws-s3/' + kubectl_bin apply -f - ++ mktemp + local LAST_OUT=/tmp/tmp.TQ1SkP12i3 ++ mktemp + local LAST_ERR=/tmp/tmp.6f5ocp8MbV + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.TQ1SkP12i3 perconaservermongodbrestore.psmdb.percona.com/restore-backup-aws-s3 created + cat /tmp/tmp.6f5ocp8MbV + rm /tmp/tmp.TQ1SkP12i3 /tmp/tmp.6f5ocp8MbV + return 0 + wait_restore backup-aws-s3 some-name + local backup_name=backup-aws-s3 + local cluster_name=some-name + local target_state=ready + local wait_cluster_consistency=1 + local wait_time=780 + set +o xtrace waiting psmdb-restore/backup-aws-s3 to reach ready state............ + '[' 1 -eq 1 ']' + wait_cluster_consistency some-name + local cluster_name=some-name + local wait_time=32 + retry=0 + sleep 7 + echo -n 'waiting for cluster readyness' waiting for cluster readyness++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.3kjmyZJLTu +++ mktemp ++ local LAST_ERR=/tmp/tmp.ZohNRfIbT5 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.3kjmyZJLTu ++ cat /tmp/tmp.ZohNRfIbT5 ++ rm /tmp/tmp.3kjmyZJLTu /tmp/tmp.ZohNRfIbT5 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 1 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.VpgoknxFB8 +++ mktemp ++ local LAST_ERR=/tmp/tmp.VIL659UFz9 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.VpgoknxFB8 ++ cat /tmp/tmp.VIL659UFz9 ++ rm /tmp/tmp.VpgoknxFB8 /tmp/tmp.VIL659UFz9 ++ return 0 + [[ error == \r\e\a\d\y ]] + let retry+=1 + '[' 2 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.xLGtxWeUx0 +++ mktemp ++ local LAST_ERR=/tmp/tmp.sOn6reu4Ct ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.xLGtxWeUx0 ++ cat /tmp/tmp.sOn6reu4Ct ++ rm /tmp/tmp.xLGtxWeUx0 /tmp/tmp.sOn6reu4Ct ++ return 0 + [[ error == \r\e\a\d\y ]] + let retry+=1 + '[' 3 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.VGSeecECNd +++ mktemp ++ local LAST_ERR=/tmp/tmp.T8Vf9clRcU ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.VGSeecECNd ++ cat /tmp/tmp.T8Vf9clRcU ++ rm /tmp/tmp.VGSeecECNd /tmp/tmp.T8Vf9clRcU ++ return 0 + [[ error == \r\e\a\d\y ]] + let retry+=1 + '[' 4 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.3xK4pKYVfm +++ mktemp ++ local LAST_ERR=/tmp/tmp.KfddBe5bc8 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.3xK4pKYVfm ++ cat /tmp/tmp.KfddBe5bc8 ++ rm /tmp/tmp.3xK4pKYVfm /tmp/tmp.KfddBe5bc8 ++ return 0 + [[ error == \r\e\a\d\y ]] + let retry+=1 + '[' 5 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.slKvU8DRX0 +++ mktemp ++ local LAST_ERR=/tmp/tmp.0Mq5d0DKst ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.slKvU8DRX0 ++ cat /tmp/tmp.0Mq5d0DKst ++ rm /tmp/tmp.slKvU8DRX0 /tmp/tmp.0Mq5d0DKst ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 6 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.D8rfjk7s3z +++ mktemp ++ local LAST_ERR=/tmp/tmp.BoaiLymyhw ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.D8rfjk7s3z ++ cat /tmp/tmp.BoaiLymyhw ++ rm /tmp/tmp.D8rfjk7s3z /tmp/tmp.BoaiLymyhw ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 7 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.vtOjXuwvqa +++ mktemp ++ local LAST_ERR=/tmp/tmp.Zt7IIqE9lt ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.vtOjXuwvqa ++ cat /tmp/tmp.Zt7IIqE9lt ++ rm /tmp/tmp.vtOjXuwvqa /tmp/tmp.Zt7IIqE9lt ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 8 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.LeS3ygqrdw +++ mktemp ++ local LAST_ERR=/tmp/tmp.EpbY3qAVsb ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.LeS3ygqrdw ++ cat /tmp/tmp.EpbY3qAVsb ++ rm /tmp/tmp.LeS3ygqrdw /tmp/tmp.EpbY3qAVsb ++ return 0 + [[ ready == \r\e\a\d\y ]] + check_data + local postfix= ++ seq 0 2 + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-16515 '' .svc.cluster.local myApp test + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local postfix= + local suffix=.svc.cluster.local + local database=myApp + local collection=test + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' + run_mongos 'use myApp\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-16515 mongodb .svc.cluster.local + local 'command=use myApp\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local driver=mongodb + local suffix=.svc.cluster.local ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.tBqsIYmcuc +++ mktemp ++ local LAST_ERR=/tmp/tmp.sjlZwchzLD ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.tBqsIYmcuc ++ cat /tmp/tmp.sjlZwchzLD ++ rm /tmp/tmp.tBqsIYmcuc /tmp/tmp.sjlZwchzLD ++ return 0 + local client_container=psmdb-client-7469665986-4v9w6 + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.GnaIikFQJQ ++ mktemp + local LAST_ERR=/tmp/tmp.QibQfsnp0x + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.GnaIikFQJQ + cat /tmp/tmp.QibQfsnp0x + rm /tmp/tmp.GnaIikFQJQ /tmp/tmp.QibQfsnp0x + return 0 + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/compare/find.json /tmp/tmp.H4mtct1uIU/find + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-16515 1 .svc.cluster.local myApp1 test + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local postfix=1 + local suffix=.svc.cluster.local + local database=myApp1 + local collection=test + run_mongos 'use myApp1\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-16515 mongodb .svc.cluster.local + local 'command=use myApp1\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local driver=mongodb + local suffix=.svc.cluster.local + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.5F8cTupj9x +++ mktemp ++ local LAST_ERR=/tmp/tmp.ZqR79HyXgi ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.5F8cTupj9x ++ cat /tmp/tmp.ZqR79HyXgi ++ rm /tmp/tmp.5F8cTupj9x /tmp/tmp.ZqR79HyXgi ++ return 0 + local client_container=psmdb-client-7469665986-4v9w6 + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp1\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.j9nPyPdybK ++ mktemp + local LAST_ERR=/tmp/tmp.nMFHneWrbW + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp1\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.j9nPyPdybK + cat /tmp/tmp.nMFHneWrbW + rm /tmp/tmp.j9nPyPdybK /tmp/tmp.nMFHneWrbW + return 0 + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/compare/find1.json /tmp/tmp.H4mtct1uIU/find1 + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-16515 2 .svc.cluster.local myApp2 test + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local postfix=2 + local suffix=.svc.cluster.local + local database=myApp2 + local collection=test + run_mongos 'use myApp2\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-16515 mongodb .svc.cluster.local + local 'command=use myApp2\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local driver=mongodb + local suffix=.svc.cluster.local + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.KQYSY3klvI +++ mktemp ++ local LAST_ERR=/tmp/tmp.uOdGOTaULC ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.KQYSY3klvI ++ cat /tmp/tmp.uOdGOTaULC ++ rm /tmp/tmp.KQYSY3klvI /tmp/tmp.uOdGOTaULC ++ return 0 + local client_container=psmdb-client-7469665986-4v9w6 + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp2\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.BgOP2xJcU4 ++ mktemp + local LAST_ERR=/tmp/tmp.ETdlchCMkf + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp2\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.BgOP2xJcU4 + cat /tmp/tmp.ETdlchCMkf + rm /tmp/tmp.BgOP2xJcU4 /tmp/tmp.ETdlchCMkf + return 0 + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/compare/find2.json /tmp/tmp.H4mtct1uIU/find2 + desc 'check backup and restore -- gcp-cs' + set +o xtrace ----------------------------------------------------------------------------------- check backup and restore -- gcp-cs ----------------------------------------------------------------------------------- ++ get_backup_dest backup-gcp-cs ++ local backup_name=backup-gcp-cs ++ kubectl_bin get psmdb-backup backup-gcp-cs -o 'jsonpath={.status.destination}' ++ sed -e 's/.json$//' ++ sed 's|azure://||' ++ sed 's|s3://||' +++ mktemp ++ local LAST_OUT=/tmp/tmp.DmpK6MJWLZ +++ mktemp ++ local LAST_ERR=/tmp/tmp.AfI4s2OdNp ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb-backup backup-gcp-cs -o 'jsonpath={.status.destination}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.DmpK6MJWLZ ++ cat /tmp/tmp.AfI4s2OdNp ++ rm /tmp/tmp.DmpK6MJWLZ /tmp/tmp.AfI4s2OdNp ++ return 0 + backup_dest_gcp=operator-testing/psmdb-demand-backup-sharded/2024-05-29T13:36:34Z + curl -s https://storage.googleapis.com/operator-testing/psmdb-demand-backup-sharded/2024-05-29T13:36:34Z/rs0/myApp.test.gz + gunzip + gunzip + curl -s https://storage.googleapis.com/operator-testing/psmdb-demand-backup-sharded/2024-05-29T13:36:34Z/rs1/myApp1.test.gz + curl -s https://storage.googleapis.com/operator-testing/psmdb-demand-backup-sharded/2024-05-29T13:36:34Z/rs2/myApp2.test.gz + gunzip + insert_data_mongos 100501 myApp + local data=100501 + local db_name=myApp + local flags= + run_mongos 'use myApp\n db.test.insert({ x: 100501 })' myApp:myPass@some-name-mongos.demand-backup-sharded-16515 '' '' '' + local 'command=use myApp\n db.test.insert({ x: 100501 })' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local driver=mongodb + local suffix=.svc.cluster.local ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.d49rzkDXth +++ mktemp ++ local LAST_ERR=/tmp/tmp.jnIITDc15x ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.d49rzkDXth ++ cat /tmp/tmp.jnIITDc15x ++ rm /tmp/tmp.d49rzkDXth /tmp/tmp.jnIITDc15x ++ return 0 + local client_container=psmdb-client-7469665986-4v9w6 + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.pOc9U66xTH ++ mktemp + local LAST_ERR=/tmp/tmp.n5WToqdOHK + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.pOc9U66xTH Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-16515.svc.cluster.local:27017/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("f7cf79bb-699f-4d8d-9a94-9eaa9b09064e") } Percona Server for MongoDB server version: v7.0.8-5 WARNING: shell and server versions do not match switched to db myApp WriteResult({ "nInserted" : 1 }) bye + cat /tmp/tmp.n5WToqdOHK + rm /tmp/tmp.pOc9U66xTH /tmp/tmp.n5WToqdOHK + return 0 + insert_data_mongos 100501 myApp1 + local data=100501 + local db_name=myApp1 + local flags= + run_mongos 'use myApp1\n db.test.insert({ x: 100501 })' myApp:myPass@some-name-mongos.demand-backup-sharded-16515 '' '' '' + local 'command=use myApp1\n db.test.insert({ x: 100501 })' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local driver=mongodb + local suffix=.svc.cluster.local ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.kukUgQllvA +++ mktemp ++ local LAST_ERR=/tmp/tmp.JXEfGCbTxX ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.kukUgQllvA ++ cat /tmp/tmp.JXEfGCbTxX ++ rm /tmp/tmp.kukUgQllvA /tmp/tmp.JXEfGCbTxX ++ return 0 + local client_container=psmdb-client-7469665986-4v9w6 + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp1\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.EeT9oQ3Dw2 ++ mktemp + local LAST_ERR=/tmp/tmp.SvdLFvUmJS + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp1\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.EeT9oQ3Dw2 Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-16515.svc.cluster.local:27017/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("30af205f-be79-434c-a28f-f82c9f1fa7ac") } Percona Server for MongoDB server version: v7.0.8-5 WARNING: shell and server versions do not match switched to db myApp1 WriteResult({ "nInserted" : 1 }) bye + cat /tmp/tmp.SvdLFvUmJS + rm /tmp/tmp.EeT9oQ3Dw2 /tmp/tmp.SvdLFvUmJS + return 0 + insert_data_mongos 100501 myApp2 + local data=100501 + local db_name=myApp2 + local flags= + run_mongos 'use myApp2\n db.test.insert({ x: 100501 })' myApp:myPass@some-name-mongos.demand-backup-sharded-16515 '' '' '' + local 'command=use myApp2\n db.test.insert({ x: 100501 })' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local driver=mongodb + local suffix=.svc.cluster.local ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.QBiQ9hDWg3 +++ mktemp ++ local LAST_ERR=/tmp/tmp.j9n4gnz2tV ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.QBiQ9hDWg3 ++ cat /tmp/tmp.j9n4gnz2tV ++ rm /tmp/tmp.QBiQ9hDWg3 /tmp/tmp.j9n4gnz2tV ++ return 0 + local client_container=psmdb-client-7469665986-4v9w6 + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp2\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.EdrvFiiy1i ++ mktemp + local LAST_ERR=/tmp/tmp.NBp06vurBO + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp2\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.EdrvFiiy1i Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-16515.svc.cluster.local:27017/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("469984e5-2468-4b60-bd77-5f7da4e31d33") } Percona Server for MongoDB server version: v7.0.8-5 WARNING: shell and server versions do not match switched to db myApp2 WriteResult({ "nInserted" : 1 }) bye + cat /tmp/tmp.NBp06vurBO + rm /tmp/tmp.EdrvFiiy1i /tmp/tmp.NBp06vurBO + return 0 + check_data -2nd + local postfix=-2nd ++ seq 0 2 + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-16515 -2nd .svc.cluster.local myApp test + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local postfix=-2nd + local suffix=.svc.cluster.local + local database=myApp + local collection=test + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' + run_mongos 'use myApp\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-16515 mongodb .svc.cluster.local + local 'command=use myApp\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local driver=mongodb + local suffix=.svc.cluster.local ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.2h2VRhLd2B +++ mktemp ++ local LAST_ERR=/tmp/tmp.6AABHKydzB ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.2h2VRhLd2B ++ cat /tmp/tmp.6AABHKydzB ++ rm /tmp/tmp.2h2VRhLd2B /tmp/tmp.6AABHKydzB ++ return 0 + local client_container=psmdb-client-7469665986-4v9w6 + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.xvH55g0AOx ++ mktemp + local LAST_ERR=/tmp/tmp.PwV3xFmE8I + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.xvH55g0AOx + cat /tmp/tmp.PwV3xFmE8I + rm /tmp/tmp.xvH55g0AOx /tmp/tmp.PwV3xFmE8I + return 0 + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/compare/find-2nd.json /tmp/tmp.H4mtct1uIU/find-2nd + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-16515 -2nd1 .svc.cluster.local myApp1 test + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local postfix=-2nd1 + local suffix=.svc.cluster.local + local database=myApp1 + local collection=test + run_mongos 'use myApp1\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-16515 mongodb .svc.cluster.local + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + local 'command=use myApp1\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local driver=mongodb + local suffix=.svc.cluster.local + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.V7qL8ZjBE7 +++ mktemp ++ local LAST_ERR=/tmp/tmp.kekus9y48W ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.V7qL8ZjBE7 ++ cat /tmp/tmp.kekus9y48W ++ rm /tmp/tmp.V7qL8ZjBE7 /tmp/tmp.kekus9y48W ++ return 0 + local client_container=psmdb-client-7469665986-4v9w6 + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp1\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.MH1QT3POCg ++ mktemp + local LAST_ERR=/tmp/tmp.tZzIk8UKzg + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp1\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.MH1QT3POCg + cat /tmp/tmp.tZzIk8UKzg + rm /tmp/tmp.MH1QT3POCg /tmp/tmp.tZzIk8UKzg + return 0 + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/compare/find-2nd1.json /tmp/tmp.H4mtct1uIU/find-2nd1 + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-16515 -2nd2 .svc.cluster.local myApp2 test + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local postfix=-2nd2 + local suffix=.svc.cluster.local + local database=myApp2 + local collection=test + run_mongos 'use myApp2\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-16515 mongodb .svc.cluster.local + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + local 'command=use myApp2\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local driver=mongodb + local suffix=.svc.cluster.local + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.c1SWr6JxZa +++ mktemp ++ local LAST_ERR=/tmp/tmp.HsWe6kRH95 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.c1SWr6JxZa ++ cat /tmp/tmp.HsWe6kRH95 ++ rm /tmp/tmp.c1SWr6JxZa /tmp/tmp.HsWe6kRH95 ++ return 0 + local client_container=psmdb-client-7469665986-4v9w6 + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp2\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.cblu9nf3E7 ++ mktemp + local LAST_ERR=/tmp/tmp.1JQ8wsO5xO + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp2\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.cblu9nf3E7 + cat /tmp/tmp.1JQ8wsO5xO + rm /tmp/tmp.cblu9nf3E7 /tmp/tmp.1JQ8wsO5xO + return 0 + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/compare/find-2nd2.json /tmp/tmp.H4mtct1uIU/find-2nd2 + run_restore backup-gcp-cs + local backup_name=backup-gcp-cs + /usr/bin/sed -e 's/name:/name: restore-backup-gcp-cs/' + /usr/bin/sed -e 's/backupName:/backupName: backup-gcp-cs/' + kubectl_bin apply -f - + cat /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/conf/restore.yml ++ mktemp + local LAST_OUT=/tmp/tmp.01NXuHWBQy ++ mktemp + local LAST_ERR=/tmp/tmp.0z371Z0oJW + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.01NXuHWBQy perconaservermongodbrestore.psmdb.percona.com/restore-backup-gcp-cs created + cat /tmp/tmp.0z371Z0oJW + rm /tmp/tmp.01NXuHWBQy /tmp/tmp.0z371Z0oJW + return 0 + wait_restore backup-gcp-cs some-name + local backup_name=backup-gcp-cs + local cluster_name=some-name + local target_state=ready + local wait_cluster_consistency=1 + local wait_time=780 + set +o xtrace waiting psmdb-restore/backup-gcp-cs to reach ready state............ + '[' 1 -eq 1 ']' + wait_cluster_consistency some-name + local cluster_name=some-name + local wait_time=32 + retry=0 + sleep 7 + echo -n 'waiting for cluster readyness' waiting for cluster readyness++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.dsuewRK2Lz +++ mktemp ++ local LAST_ERR=/tmp/tmp.bgeoF2Z7U0 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.dsuewRK2Lz ++ cat /tmp/tmp.bgeoF2Z7U0 ++ rm /tmp/tmp.dsuewRK2Lz /tmp/tmp.bgeoF2Z7U0 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 1 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.AZlgRhTfzG +++ mktemp ++ local LAST_ERR=/tmp/tmp.IJrrB7r20n ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.AZlgRhTfzG ++ cat /tmp/tmp.IJrrB7r20n ++ rm /tmp/tmp.AZlgRhTfzG /tmp/tmp.IJrrB7r20n ++ return 0 + [[ error == \r\e\a\d\y ]] + let retry+=1 + '[' 2 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.m6O9BLHGXr +++ mktemp ++ local LAST_ERR=/tmp/tmp.aJfoAJabgr ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.m6O9BLHGXr ++ cat /tmp/tmp.aJfoAJabgr ++ rm /tmp/tmp.m6O9BLHGXr /tmp/tmp.aJfoAJabgr ++ return 0 + [[ error == \r\e\a\d\y ]] + let retry+=1 + '[' 3 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.kfQhctOcS5 +++ mktemp ++ local LAST_ERR=/tmp/tmp.gdm8NASP4S ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.kfQhctOcS5 ++ cat /tmp/tmp.gdm8NASP4S ++ rm /tmp/tmp.kfQhctOcS5 /tmp/tmp.gdm8NASP4S ++ return 0 + [[ error == \r\e\a\d\y ]] + let retry+=1 + '[' 4 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.tEceiTa5P6 +++ mktemp ++ local LAST_ERR=/tmp/tmp.slyHzJ4kmU ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.tEceiTa5P6 ++ cat /tmp/tmp.slyHzJ4kmU ++ rm /tmp/tmp.tEceiTa5P6 /tmp/tmp.slyHzJ4kmU ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 5 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.kYuTQk6ojO +++ mktemp ++ local LAST_ERR=/tmp/tmp.bSe5t9hcoh ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.kYuTQk6ojO ++ cat /tmp/tmp.bSe5t9hcoh ++ rm /tmp/tmp.kYuTQk6ojO /tmp/tmp.bSe5t9hcoh ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 6 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.pwT0QiYRJT +++ mktemp ++ local LAST_ERR=/tmp/tmp.uTrRbmstIS ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.pwT0QiYRJT ++ cat /tmp/tmp.uTrRbmstIS ++ rm /tmp/tmp.pwT0QiYRJT /tmp/tmp.uTrRbmstIS ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 7 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.mkmZaJvJK9 +++ mktemp ++ local LAST_ERR=/tmp/tmp.8lZz8yfS9h ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.mkmZaJvJK9 ++ cat /tmp/tmp.8lZz8yfS9h ++ rm /tmp/tmp.mkmZaJvJK9 /tmp/tmp.8lZz8yfS9h ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 8 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.nVLPxoP0Uz +++ mktemp ++ local LAST_ERR=/tmp/tmp.ddy48dzAQS ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.nVLPxoP0Uz ++ cat /tmp/tmp.ddy48dzAQS ++ rm /tmp/tmp.nVLPxoP0Uz /tmp/tmp.ddy48dzAQS ++ return 0 + [[ ready == \r\e\a\d\y ]] + check_data + local postfix= ++ seq 0 2 + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-16515 '' .svc.cluster.local myApp test + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local postfix= + local suffix=.svc.cluster.local + local database=myApp + local collection=test + run_mongos 'use myApp\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-16515 mongodb .svc.cluster.local + local 'command=use myApp\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local driver=mongodb + local suffix=.svc.cluster.local + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.0P4PE93DpS +++ mktemp ++ local LAST_ERR=/tmp/tmp.buTdUYjAtQ ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.0P4PE93DpS ++ cat /tmp/tmp.buTdUYjAtQ ++ rm /tmp/tmp.0P4PE93DpS /tmp/tmp.buTdUYjAtQ ++ return 0 + local client_container=psmdb-client-7469665986-4v9w6 + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.NDmqxq3uEn ++ mktemp + local LAST_ERR=/tmp/tmp.RpqQVzmp9m + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.NDmqxq3uEn + cat /tmp/tmp.RpqQVzmp9m + rm /tmp/tmp.NDmqxq3uEn /tmp/tmp.RpqQVzmp9m + return 0 + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/compare/find.json /tmp/tmp.H4mtct1uIU/find + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-16515 1 .svc.cluster.local myApp1 test + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local postfix=1 + local suffix=.svc.cluster.local + local database=myApp1 + local collection=test + run_mongos 'use myApp1\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-16515 mongodb .svc.cluster.local + local 'command=use myApp1\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local driver=mongodb + local suffix=.svc.cluster.local + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.IsVhv7iSLh +++ mktemp ++ local LAST_ERR=/tmp/tmp.2WV7BhiCRr ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.IsVhv7iSLh ++ cat /tmp/tmp.2WV7BhiCRr ++ rm /tmp/tmp.IsVhv7iSLh /tmp/tmp.2WV7BhiCRr ++ return 0 + local client_container=psmdb-client-7469665986-4v9w6 + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp1\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.z6YtRjwB33 ++ mktemp + local LAST_ERR=/tmp/tmp.eA1hvqc6FH + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp1\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.z6YtRjwB33 + cat /tmp/tmp.eA1hvqc6FH + rm /tmp/tmp.z6YtRjwB33 /tmp/tmp.eA1hvqc6FH + return 0 + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/compare/find1.json /tmp/tmp.H4mtct1uIU/find1 + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-16515 2 .svc.cluster.local myApp2 test + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local postfix=2 + local suffix=.svc.cluster.local + local database=myApp2 + local collection=test + run_mongos 'use myApp2\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-16515 mongodb .svc.cluster.local + local 'command=use myApp2\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local driver=mongodb + local suffix=.svc.cluster.local + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.hGE6c3Vrrs +++ mktemp ++ local LAST_ERR=/tmp/tmp.U1vJTzF9up ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.hGE6c3Vrrs ++ cat /tmp/tmp.U1vJTzF9up ++ rm /tmp/tmp.hGE6c3Vrrs /tmp/tmp.U1vJTzF9up ++ return 0 + local client_container=psmdb-client-7469665986-4v9w6 + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp2\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.9mK0uAuVWh ++ mktemp + local LAST_ERR=/tmp/tmp.af9sgieLgU + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp2\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.9mK0uAuVWh + cat /tmp/tmp.af9sgieLgU + rm /tmp/tmp.9mK0uAuVWh /tmp/tmp.af9sgieLgU + return 0 + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/compare/find2.json /tmp/tmp.H4mtct1uIU/find2 + desc 'check backup and restore -- azure-blob' + set +o xtrace ----------------------------------------------------------------------------------- check backup and restore -- azure-blob ----------------------------------------------------------------------------------- ++ get_backup_dest backup-azure-blob ++ local backup_name=backup-azure-blob ++ kubectl_bin get psmdb-backup backup-azure-blob -o 'jsonpath={.status.destination}' ++ sed -e 's/.json$//' ++ sed 's|azure://||' ++ sed 's|s3://||' +++ mktemp ++ local LAST_OUT=/tmp/tmp.fr1jKRtVNp +++ mktemp ++ local LAST_ERR=/tmp/tmp.V7dULjrv1o ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb-backup backup-azure-blob -o 'jsonpath={.status.destination}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.fr1jKRtVNp ++ cat /tmp/tmp.V7dULjrv1o ++ rm /tmp/tmp.fr1jKRtVNp /tmp/tmp.V7dULjrv1o ++ return 0 + backup_dest_azure=operator-testing/psmdb-demand-backup-sharded/2024-05-29T13:37:11Z + curl -s https://engk8soperators.blob.core.windows.net/operator-testing/psmdb-demand-backup-sharded/2024-05-29T13:37:11Z/rs0/myApp.test.gz + gunzip + curl -s https://engk8soperators.blob.core.windows.net/operator-testing/psmdb-demand-backup-sharded/2024-05-29T13:37:11Z/rs1/myApp1.test.gz + gunzip + gunzip + curl -s https://engk8soperators.blob.core.windows.net/operator-testing/psmdb-demand-backup-sharded/2024-05-29T13:37:11Z/rs2/myApp2.test.gz + insert_data_mongos 100501 myApp + local data=100501 + local db_name=myApp + local flags= + run_mongos 'use myApp\n db.test.insert({ x: 100501 })' myApp:myPass@some-name-mongos.demand-backup-sharded-16515 '' '' '' + local 'command=use myApp\n db.test.insert({ x: 100501 })' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local driver=mongodb + local suffix=.svc.cluster.local ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.h3Pb7RfcR4 +++ mktemp ++ local LAST_ERR=/tmp/tmp.swqhhhzA2z ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.h3Pb7RfcR4 ++ cat /tmp/tmp.swqhhhzA2z ++ rm /tmp/tmp.h3Pb7RfcR4 /tmp/tmp.swqhhhzA2z ++ return 0 + local client_container=psmdb-client-7469665986-4v9w6 + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.fQCbGHgKT2 ++ mktemp + local LAST_ERR=/tmp/tmp.bdhPo8zah4 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.fQCbGHgKT2 Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-16515.svc.cluster.local:27017/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("b77ee110-889f-4041-98f9-d59afaddd608") } Percona Server for MongoDB server version: v7.0.8-5 WARNING: shell and server versions do not match switched to db myApp WriteResult({ "nInserted" : 1 }) bye + cat /tmp/tmp.bdhPo8zah4 + rm /tmp/tmp.fQCbGHgKT2 /tmp/tmp.bdhPo8zah4 + return 0 + insert_data_mongos 100501 myApp1 + local data=100501 + local db_name=myApp1 + local flags= + run_mongos 'use myApp1\n db.test.insert({ x: 100501 })' myApp:myPass@some-name-mongos.demand-backup-sharded-16515 '' '' '' + local 'command=use myApp1\n db.test.insert({ x: 100501 })' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local driver=mongodb + local suffix=.svc.cluster.local ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.5kb2mthLci +++ mktemp ++ local LAST_ERR=/tmp/tmp.0x8SVQcImj ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.5kb2mthLci ++ cat /tmp/tmp.0x8SVQcImj ++ rm /tmp/tmp.5kb2mthLci /tmp/tmp.0x8SVQcImj ++ return 0 + local client_container=psmdb-client-7469665986-4v9w6 + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp1\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.QUCmEsFEo8 ++ mktemp + local LAST_ERR=/tmp/tmp.M3COJflJZG + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp1\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.QUCmEsFEo8 Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-16515.svc.cluster.local:27017/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("5c2d62fb-6184-49a5-863a-9446d1bd9e5d") } Percona Server for MongoDB server version: v7.0.8-5 WARNING: shell and server versions do not match switched to db myApp1 WriteResult({ "nInserted" : 1 }) bye + cat /tmp/tmp.M3COJflJZG + rm /tmp/tmp.QUCmEsFEo8 /tmp/tmp.M3COJflJZG + return 0 + insert_data_mongos 100501 myApp2 + local data=100501 + local db_name=myApp2 + local flags= + run_mongos 'use myApp2\n db.test.insert({ x: 100501 })' myApp:myPass@some-name-mongos.demand-backup-sharded-16515 '' '' '' + local 'command=use myApp2\n db.test.insert({ x: 100501 })' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local driver=mongodb + local suffix=.svc.cluster.local ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.zvOQtd2CJo +++ mktemp ++ local LAST_ERR=/tmp/tmp.tcFdm99FNx ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.zvOQtd2CJo ++ cat /tmp/tmp.tcFdm99FNx ++ rm /tmp/tmp.zvOQtd2CJo /tmp/tmp.tcFdm99FNx ++ return 0 + local client_container=psmdb-client-7469665986-4v9w6 + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp2\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.qKlCOfrtvE ++ mktemp + local LAST_ERR=/tmp/tmp.8yiRLFLyD4 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp2\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.qKlCOfrtvE Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-16515.svc.cluster.local:27017/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("d0d28dce-6488-4059-bd32-2d1a14abc4f3") } Percona Server for MongoDB server version: v7.0.8-5 WARNING: shell and server versions do not match switched to db myApp2 WriteResult({ "nInserted" : 1 }) bye + cat /tmp/tmp.8yiRLFLyD4 + rm /tmp/tmp.qKlCOfrtvE /tmp/tmp.8yiRLFLyD4 + return 0 + check_data -2nd + local postfix=-2nd ++ seq 0 2 + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-16515 -2nd .svc.cluster.local myApp test + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local postfix=-2nd + local suffix=.svc.cluster.local + local database=myApp + local collection=test + run_mongos 'use myApp\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-16515 mongodb .svc.cluster.local + local 'command=use myApp\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + local driver=mongodb + local suffix=.svc.cluster.local + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.b6WPd6f9Xy +++ mktemp ++ local LAST_ERR=/tmp/tmp.lXlLtmDu09 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.b6WPd6f9Xy ++ cat /tmp/tmp.lXlLtmDu09 ++ rm /tmp/tmp.b6WPd6f9Xy /tmp/tmp.lXlLtmDu09 ++ return 0 + local client_container=psmdb-client-7469665986-4v9w6 + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.RFMrC1vNL7 ++ mktemp + local LAST_ERR=/tmp/tmp.8WelMETa88 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.RFMrC1vNL7 + cat /tmp/tmp.8WelMETa88 + rm /tmp/tmp.RFMrC1vNL7 /tmp/tmp.8WelMETa88 + return 0 + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/compare/find-2nd.json /tmp/tmp.H4mtct1uIU/find-2nd + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-16515 -2nd1 .svc.cluster.local myApp1 test + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local postfix=-2nd1 + local suffix=.svc.cluster.local + local database=myApp1 + local collection=test + run_mongos 'use myApp1\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-16515 mongodb .svc.cluster.local + local 'command=use myApp1\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local driver=mongodb + local suffix=.svc.cluster.local + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.zO3gV0pV4B +++ mktemp ++ local LAST_ERR=/tmp/tmp.Fzmp1Co3Qm ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.zO3gV0pV4B ++ cat /tmp/tmp.Fzmp1Co3Qm ++ rm /tmp/tmp.zO3gV0pV4B /tmp/tmp.Fzmp1Co3Qm ++ return 0 + local client_container=psmdb-client-7469665986-4v9w6 + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp1\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.LhgFb5rZLj ++ mktemp + local LAST_ERR=/tmp/tmp.tuTLKVF62u + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp1\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.LhgFb5rZLj + cat /tmp/tmp.tuTLKVF62u + rm /tmp/tmp.LhgFb5rZLj /tmp/tmp.tuTLKVF62u + return 0 + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/compare/find-2nd1.json /tmp/tmp.H4mtct1uIU/find-2nd1 + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-16515 -2nd2 .svc.cluster.local myApp2 test + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local postfix=-2nd2 + local suffix=.svc.cluster.local + local database=myApp2 + local collection=test + run_mongos 'use myApp2\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-16515 mongodb .svc.cluster.local + local 'command=use myApp2\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local driver=mongodb + local suffix=.svc.cluster.local + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.7FyRAmq6HM +++ mktemp ++ local LAST_ERR=/tmp/tmp.4rZ7OsCrfb ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.7FyRAmq6HM ++ cat /tmp/tmp.4rZ7OsCrfb ++ rm /tmp/tmp.7FyRAmq6HM /tmp/tmp.4rZ7OsCrfb ++ return 0 + local client_container=psmdb-client-7469665986-4v9w6 + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp2\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.D7FmlShv5A ++ mktemp + local LAST_ERR=/tmp/tmp.VrjOFfIbPF + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp2\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.D7FmlShv5A + cat /tmp/tmp.VrjOFfIbPF + rm /tmp/tmp.D7FmlShv5A /tmp/tmp.VrjOFfIbPF + return 0 + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/compare/find-2nd2.json /tmp/tmp.H4mtct1uIU/find-2nd2 + run_restore backup-azure-blob + local backup_name=backup-azure-blob + cat /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/conf/restore.yml + /usr/bin/sed -e 's/name:/name: restore-backup-azure-blob/' + /usr/bin/sed -e 's/backupName:/backupName: backup-azure-blob/' + kubectl_bin apply -f - ++ mktemp + local LAST_OUT=/tmp/tmp.3fUSuGNlXt ++ mktemp + local LAST_ERR=/tmp/tmp.2EijcWZoUu + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.3fUSuGNlXt perconaservermongodbrestore.psmdb.percona.com/restore-backup-azure-blob created + cat /tmp/tmp.2EijcWZoUu + rm /tmp/tmp.3fUSuGNlXt /tmp/tmp.2EijcWZoUu + return 0 + wait_restore backup-azure-blob some-name + local backup_name=backup-azure-blob + local cluster_name=some-name + local target_state=ready + local wait_cluster_consistency=1 + local wait_time=780 + set +o xtrace waiting psmdb-restore/backup-azure-blob to reach ready state............ + '[' 1 -eq 1 ']' + wait_cluster_consistency some-name + local cluster_name=some-name + local wait_time=32 + retry=0 + sleep 7 + echo -n 'waiting for cluster readyness' waiting for cluster readyness++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.9GIojIt69O +++ mktemp ++ local LAST_ERR=/tmp/tmp.S6BBNA7WS5 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.9GIojIt69O ++ cat /tmp/tmp.S6BBNA7WS5 ++ rm /tmp/tmp.9GIojIt69O /tmp/tmp.S6BBNA7WS5 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 1 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.xmrTnuuWLQ +++ mktemp ++ local LAST_ERR=/tmp/tmp.wQLyIuNrkj ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.xmrTnuuWLQ ++ cat /tmp/tmp.wQLyIuNrkj ++ rm /tmp/tmp.xmrTnuuWLQ /tmp/tmp.wQLyIuNrkj ++ return 0 + [[ error == \r\e\a\d\y ]] + let retry+=1 + '[' 2 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.8SgqpJfe4W +++ mktemp ++ local LAST_ERR=/tmp/tmp.A5PWYtTP76 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.8SgqpJfe4W ++ cat /tmp/tmp.A5PWYtTP76 ++ rm /tmp/tmp.8SgqpJfe4W /tmp/tmp.A5PWYtTP76 ++ return 0 + [[ error == \r\e\a\d\y ]] + let retry+=1 + '[' 3 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.CYa66iqD41 +++ mktemp ++ local LAST_ERR=/tmp/tmp.WEWJy4vT4d ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.CYa66iqD41 ++ cat /tmp/tmp.WEWJy4vT4d ++ rm /tmp/tmp.CYa66iqD41 /tmp/tmp.WEWJy4vT4d ++ return 0 + [[ error == \r\e\a\d\y ]] + let retry+=1 + '[' 4 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.hEhHTZzSYC +++ mktemp ++ local LAST_ERR=/tmp/tmp.MTAsaMemjP ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.hEhHTZzSYC ++ cat /tmp/tmp.MTAsaMemjP ++ rm /tmp/tmp.hEhHTZzSYC /tmp/tmp.MTAsaMemjP ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 5 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.YKlPICZvrU +++ mktemp ++ local LAST_ERR=/tmp/tmp.OISIcU39c4 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.YKlPICZvrU ++ cat /tmp/tmp.OISIcU39c4 ++ rm /tmp/tmp.YKlPICZvrU /tmp/tmp.OISIcU39c4 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 6 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.UOVi1VNfDm +++ mktemp ++ local LAST_ERR=/tmp/tmp.NgKbay1Ap6 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.UOVi1VNfDm ++ cat /tmp/tmp.NgKbay1Ap6 ++ rm /tmp/tmp.UOVi1VNfDm /tmp/tmp.NgKbay1Ap6 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 7 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.89CKbmdsRS +++ mktemp ++ local LAST_ERR=/tmp/tmp.lEzRS52kkA ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.89CKbmdsRS ++ cat /tmp/tmp.lEzRS52kkA ++ rm /tmp/tmp.89CKbmdsRS /tmp/tmp.lEzRS52kkA ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 8 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.4XuGm5NvUS +++ mktemp ++ local LAST_ERR=/tmp/tmp.bvrZByZ5vX ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.4XuGm5NvUS ++ cat /tmp/tmp.bvrZByZ5vX ++ rm /tmp/tmp.4XuGm5NvUS /tmp/tmp.bvrZByZ5vX ++ return 0 + [[ ready == \r\e\a\d\y ]] + check_data + local postfix= ++ seq 0 2 + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-16515 '' .svc.cluster.local myApp test + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local postfix= + local suffix=.svc.cluster.local + local database=myApp + local collection=test + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' + run_mongos 'use myApp\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-16515 mongodb .svc.cluster.local + local 'command=use myApp\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local driver=mongodb + local suffix=.svc.cluster.local ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.QL2fU3IidS +++ mktemp ++ local LAST_ERR=/tmp/tmp.1wIKj9BvaX ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.QL2fU3IidS ++ cat /tmp/tmp.1wIKj9BvaX ++ rm /tmp/tmp.QL2fU3IidS /tmp/tmp.1wIKj9BvaX ++ return 0 + local client_container=psmdb-client-7469665986-4v9w6 + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.3ONhOL1GTW ++ mktemp + local LAST_ERR=/tmp/tmp.M6S8pIuz0p + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.3ONhOL1GTW + cat /tmp/tmp.M6S8pIuz0p + rm /tmp/tmp.3ONhOL1GTW /tmp/tmp.M6S8pIuz0p + return 0 + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/compare/find.json /tmp/tmp.H4mtct1uIU/find + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-16515 1 .svc.cluster.local myApp1 test + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local postfix=1 + local suffix=.svc.cluster.local + local database=myApp1 + local collection=test + run_mongos 'use myApp1\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-16515 mongodb .svc.cluster.local + local 'command=use myApp1\n db.test.find()' + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local driver=mongodb + local suffix=.svc.cluster.local + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.2u8Gownvhx +++ mktemp ++ local LAST_ERR=/tmp/tmp.HqFwZ8UKPU ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.2u8Gownvhx ++ cat /tmp/tmp.HqFwZ8UKPU ++ rm /tmp/tmp.2u8Gownvhx /tmp/tmp.HqFwZ8UKPU ++ return 0 + local client_container=psmdb-client-7469665986-4v9w6 + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp1\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.j76j4ipGdP ++ mktemp + local LAST_ERR=/tmp/tmp.VjXkKijlkW + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp1\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.j76j4ipGdP + cat /tmp/tmp.VjXkKijlkW + rm /tmp/tmp.j76j4ipGdP /tmp/tmp.VjXkKijlkW + return 0 + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/compare/find1.json /tmp/tmp.H4mtct1uIU/find1 + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-16515 2 .svc.cluster.local myApp2 test + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local postfix=2 + local suffix=.svc.cluster.local + local database=myApp2 + local collection=test + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + run_mongos 'use myApp2\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-16515 mongodb .svc.cluster.local + local 'command=use myApp2\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local driver=mongodb + local suffix=.svc.cluster.local ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.abb3soQ4wv +++ mktemp ++ local LAST_ERR=/tmp/tmp.sZ5jXC7SiU ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.abb3soQ4wv ++ cat /tmp/tmp.sZ5jXC7SiU ++ rm /tmp/tmp.abb3soQ4wv /tmp/tmp.sZ5jXC7SiU ++ return 0 + local client_container=psmdb-client-7469665986-4v9w6 + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp2\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.XgesnK02pU ++ mktemp + local LAST_ERR=/tmp/tmp.aqxs6WHhWC + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp2\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.XgesnK02pU + cat /tmp/tmp.aqxs6WHhWC + rm /tmp/tmp.XgesnK02pU /tmp/tmp.aqxs6WHhWC + return 0 + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/compare/find2.json /tmp/tmp.H4mtct1uIU/find2 + desc 'check backup and restore -- minio' + set +o xtrace ----------------------------------------------------------------------------------- check backup and restore -- minio ----------------------------------------------------------------------------------- ++ get_backup_dest backup-minio ++ local backup_name=backup-minio ++ kubectl_bin get psmdb-backup backup-minio -o 'jsonpath={.status.destination}' ++ sed 's|azure://||' +++ mktemp ++ sed 's|s3://||' ++ sed -e 's/.json$//' ++ local LAST_OUT=/tmp/tmp.elfVMJAzJ0 +++ mktemp ++ local LAST_ERR=/tmp/tmp.qgBzktvAG6 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb-backup backup-minio -o 'jsonpath={.status.destination}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.elfVMJAzJ0 ++ cat /tmp/tmp.qgBzktvAG6 ++ rm /tmp/tmp.elfVMJAzJ0 /tmp/tmp.qgBzktvAG6 ++ return 0 + backup_dest_minio=operator-testing/2024-05-29T13:35:08Z + kubectl_bin run -i --rm aws-cli --image=perconalab/awscli --restart=Never -- /usr/bin/env AWS_ACCESS_KEY_ID=some-access-key AWS_SECRET_ACCESS_KEY=some-secret-key AWS_DEFAULT_REGION=us-east-1 /usr/bin/aws --endpoint-url http://minio-service:9000 s3 ls s3://operator-testing/2024-05-29T13:35:08Z/rs0/ + grep myApp.test.gz ++ mktemp + local LAST_OUT=/tmp/tmp.tbYqnkWRVY ++ mktemp + local LAST_ERR=/tmp/tmp.W7MStzCVkB + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl run -i --rm aws-cli --image=perconalab/awscli --restart=Never -- /usr/bin/env AWS_ACCESS_KEY_ID=some-access-key AWS_SECRET_ACCESS_KEY=some-secret-key AWS_DEFAULT_REGION=us-east-1 /usr/bin/aws --endpoint-url http://minio-service:9000 s3 ls s3://operator-testing/2024-05-29T13:35:08Z/rs0/ + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.tbYqnkWRVY + cat /tmp/tmp.W7MStzCVkB If you don't see a command prompt, try pressing enter. warning: couldn't attach to pod/aws-cli, falling back to streaming logs: unable to upgrade connection: container aws-cli not found in pod aws-cli_demand-backup-sharded-16515 + rm /tmp/tmp.tbYqnkWRVY /tmp/tmp.W7MStzCVkB + return 0 2024-05-29 13:35:13 55 myApp.test.gz + insert_data_mongos 100501 myApp + local data=100501 + local db_name=myApp + local flags= + run_mongos 'use myApp\n db.test.insert({ x: 100501 })' myApp:myPass@some-name-mongos.demand-backup-sharded-16515 '' '' '' + local 'command=use myApp\n db.test.insert({ x: 100501 })' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local driver=mongodb + local suffix=.svc.cluster.local ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ZNTCUkIdja +++ mktemp ++ local LAST_ERR=/tmp/tmp.ZK9nrMajSs ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.ZNTCUkIdja ++ cat /tmp/tmp.ZK9nrMajSs ++ rm /tmp/tmp.ZNTCUkIdja /tmp/tmp.ZK9nrMajSs ++ return 0 + local client_container=psmdb-client-7469665986-4v9w6 + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.a4kIL53eFv ++ mktemp + local LAST_ERR=/tmp/tmp.HPLzrKYpJc + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.a4kIL53eFv Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-16515.svc.cluster.local:27017/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("fc15e24f-a083-4452-9ff1-1913696bb7d2") } Percona Server for MongoDB server version: v7.0.8-5 WARNING: shell and server versions do not match switched to db myApp WriteResult({ "nInserted" : 1 }) bye + cat /tmp/tmp.HPLzrKYpJc + rm /tmp/tmp.a4kIL53eFv /tmp/tmp.HPLzrKYpJc + return 0 + insert_data_mongos 100501 myApp1 + local data=100501 + local db_name=myApp1 + local flags= + run_mongos 'use myApp1\n db.test.insert({ x: 100501 })' myApp:myPass@some-name-mongos.demand-backup-sharded-16515 '' '' '' + local 'command=use myApp1\n db.test.insert({ x: 100501 })' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local driver=mongodb + local suffix=.svc.cluster.local ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.l5uMwwxTdl +++ mktemp ++ local LAST_ERR=/tmp/tmp.rj5vrZonac ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.l5uMwwxTdl ++ cat /tmp/tmp.rj5vrZonac ++ rm /tmp/tmp.l5uMwwxTdl /tmp/tmp.rj5vrZonac ++ return 0 + local client_container=psmdb-client-7469665986-4v9w6 + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp1\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.FCwJKiQkSE ++ mktemp + local LAST_ERR=/tmp/tmp.FsyrMqUW4C + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp1\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.FCwJKiQkSE Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-16515.svc.cluster.local:27017/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("0da731c1-dbd7-452a-9326-9816440a0891") } Percona Server for MongoDB server version: v7.0.8-5 WARNING: shell and server versions do not match switched to db myApp1 WriteResult({ "nInserted" : 1 }) bye + cat /tmp/tmp.FsyrMqUW4C + rm /tmp/tmp.FCwJKiQkSE /tmp/tmp.FsyrMqUW4C + return 0 + insert_data_mongos 100501 myApp2 + local data=100501 + local db_name=myApp2 + local flags= + run_mongos 'use myApp2\n db.test.insert({ x: 100501 })' myApp:myPass@some-name-mongos.demand-backup-sharded-16515 '' '' '' + local 'command=use myApp2\n db.test.insert({ x: 100501 })' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local driver=mongodb + local suffix=.svc.cluster.local ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.1eiUcYHuWl +++ mktemp ++ local LAST_ERR=/tmp/tmp.8GP328xihQ ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.1eiUcYHuWl ++ cat /tmp/tmp.8GP328xihQ ++ rm /tmp/tmp.1eiUcYHuWl /tmp/tmp.8GP328xihQ ++ return 0 + local client_container=psmdb-client-7469665986-4v9w6 + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp2\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.hbUZMy6cii ++ mktemp + local LAST_ERR=/tmp/tmp.AkqsY7jHu1 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp2\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.hbUZMy6cii Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-16515.svc.cluster.local:27017/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("a835ec26-342e-4488-a9b9-a8d1fa153bad") } Percona Server for MongoDB server version: v7.0.8-5 WARNING: shell and server versions do not match switched to db myApp2 WriteResult({ "nInserted" : 1 }) bye + cat /tmp/tmp.AkqsY7jHu1 + rm /tmp/tmp.hbUZMy6cii /tmp/tmp.AkqsY7jHu1 + return 0 + check_data -2nd + local postfix=-2nd ++ seq 0 2 + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-16515 -2nd .svc.cluster.local myApp test + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local postfix=-2nd + local suffix=.svc.cluster.local + local database=myApp + local collection=test + run_mongos 'use myApp\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-16515 mongodb .svc.cluster.local + local 'command=use myApp\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local driver=mongodb + local suffix=.svc.cluster.local + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' +++ mktemp ++ local LAST_OUT=/tmp/tmp.eJa1i6BA9g +++ mktemp ++ local LAST_ERR=/tmp/tmp.bKCvcqhGBI ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.eJa1i6BA9g ++ cat /tmp/tmp.bKCvcqhGBI ++ rm /tmp/tmp.eJa1i6BA9g /tmp/tmp.bKCvcqhGBI ++ return 0 + local client_container=psmdb-client-7469665986-4v9w6 + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.MDAR6mLPWy ++ mktemp + local LAST_ERR=/tmp/tmp.y4CK7wkmWc + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.MDAR6mLPWy + cat /tmp/tmp.y4CK7wkmWc + rm /tmp/tmp.MDAR6mLPWy /tmp/tmp.y4CK7wkmWc + return 0 + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/compare/find-2nd.json /tmp/tmp.H4mtct1uIU/find-2nd + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-16515 -2nd1 .svc.cluster.local myApp1 test + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local postfix=-2nd1 + local suffix=.svc.cluster.local + local database=myApp1 + local collection=test + run_mongos 'use myApp1\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-16515 mongodb .svc.cluster.local + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + local 'command=use myApp1\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local driver=mongodb + local suffix=.svc.cluster.local + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.TyuH8ZZEtE +++ mktemp ++ local LAST_ERR=/tmp/tmp.GQEqgdbsjv ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.TyuH8ZZEtE ++ cat /tmp/tmp.GQEqgdbsjv ++ rm /tmp/tmp.TyuH8ZZEtE /tmp/tmp.GQEqgdbsjv ++ return 0 + local client_container=psmdb-client-7469665986-4v9w6 + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp1\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.MjYMHUR6qD ++ mktemp + local LAST_ERR=/tmp/tmp.Hwt4oJxrOM + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp1\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.MjYMHUR6qD + cat /tmp/tmp.Hwt4oJxrOM + rm /tmp/tmp.MjYMHUR6qD /tmp/tmp.Hwt4oJxrOM + return 0 + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/compare/find-2nd1.json /tmp/tmp.H4mtct1uIU/find-2nd1 + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-16515 -2nd2 .svc.cluster.local myApp2 test + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local postfix=-2nd2 + local suffix=.svc.cluster.local + local database=myApp2 + local collection=test + run_mongos 'use myApp2\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-16515 mongodb .svc.cluster.local + local 'command=use myApp2\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local driver=mongodb + local suffix=.svc.cluster.local + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.va3740o1H3 +++ mktemp ++ local LAST_ERR=/tmp/tmp.ek4Rd0P1UJ ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.va3740o1H3 ++ cat /tmp/tmp.ek4Rd0P1UJ ++ rm /tmp/tmp.va3740o1H3 /tmp/tmp.ek4Rd0P1UJ ++ return 0 + local client_container=psmdb-client-7469665986-4v9w6 + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp2\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.KHYuIm3aFA ++ mktemp + local LAST_ERR=/tmp/tmp.3GUEVJdlOH + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp2\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.KHYuIm3aFA + cat /tmp/tmp.3GUEVJdlOH + rm /tmp/tmp.KHYuIm3aFA /tmp/tmp.3GUEVJdlOH + return 0 + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/compare/find-2nd2.json /tmp/tmp.H4mtct1uIU/find-2nd2 + run_restore backup-minio + local backup_name=backup-minio + cat /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/conf/restore.yml + /usr/bin/sed -e 's/backupName:/backupName: backup-minio/' + kubectl_bin apply -f - + /usr/bin/sed -e 's/name:/name: restore-backup-minio/' ++ mktemp + local LAST_OUT=/tmp/tmp.jkPyt1Lsx0 ++ mktemp + local LAST_ERR=/tmp/tmp.kL482UQAIX + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.jkPyt1Lsx0 perconaservermongodbrestore.psmdb.percona.com/restore-backup-minio created + cat /tmp/tmp.kL482UQAIX + rm /tmp/tmp.jkPyt1Lsx0 /tmp/tmp.kL482UQAIX + return 0 + wait_restore backup-minio some-name + local backup_name=backup-minio + local cluster_name=some-name + local target_state=ready + local wait_cluster_consistency=1 + local wait_time=780 + set +o xtrace waiting psmdb-restore/backup-minio to reach ready state............ + '[' 1 -eq 1 ']' + wait_cluster_consistency some-name + local cluster_name=some-name + local wait_time=32 + retry=0 + sleep 7 + echo -n 'waiting for cluster readyness' waiting for cluster readyness++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.3fAHvfbx6G +++ mktemp ++ local LAST_ERR=/tmp/tmp.8VYO6RglZR ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.3fAHvfbx6G ++ cat /tmp/tmp.8VYO6RglZR ++ rm /tmp/tmp.3fAHvfbx6G /tmp/tmp.8VYO6RglZR ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 1 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.5Zh94B76nJ +++ mktemp ++ local LAST_ERR=/tmp/tmp.n3KH8Xep04 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.5Zh94B76nJ ++ cat /tmp/tmp.n3KH8Xep04 ++ rm /tmp/tmp.5Zh94B76nJ /tmp/tmp.n3KH8Xep04 ++ return 0 + [[ error == \r\e\a\d\y ]] + let retry+=1 + '[' 2 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.eJuMJo9Wi1 +++ mktemp ++ local LAST_ERR=/tmp/tmp.FAnddSf4K4 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.eJuMJo9Wi1 ++ cat /tmp/tmp.FAnddSf4K4 ++ rm /tmp/tmp.eJuMJo9Wi1 /tmp/tmp.FAnddSf4K4 ++ return 0 + [[ error == \r\e\a\d\y ]] + let retry+=1 + '[' 3 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.YxXhtJrYaA +++ mktemp ++ local LAST_ERR=/tmp/tmp.nhO6jVPcS7 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.YxXhtJrYaA ++ cat /tmp/tmp.nhO6jVPcS7 ++ rm /tmp/tmp.YxXhtJrYaA /tmp/tmp.nhO6jVPcS7 ++ return 0 + [[ error == \r\e\a\d\y ]] + let retry+=1 + '[' 4 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.bU9st1XStX +++ mktemp ++ local LAST_ERR=/tmp/tmp.1JX2ARPJkZ ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.bU9st1XStX ++ cat /tmp/tmp.1JX2ARPJkZ ++ rm /tmp/tmp.bU9st1XStX /tmp/tmp.1JX2ARPJkZ ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 5 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.feDD31KTof +++ mktemp ++ local LAST_ERR=/tmp/tmp.LTWaYCwwwu ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.feDD31KTof ++ cat /tmp/tmp.LTWaYCwwwu ++ rm /tmp/tmp.feDD31KTof /tmp/tmp.LTWaYCwwwu ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 6 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Xi7mKuXi70 +++ mktemp ++ local LAST_ERR=/tmp/tmp.22M7duYKBC ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.Xi7mKuXi70 ++ cat /tmp/tmp.22M7duYKBC ++ rm /tmp/tmp.Xi7mKuXi70 /tmp/tmp.22M7duYKBC ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 7 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.2VsI3nukQp +++ mktemp ++ local LAST_ERR=/tmp/tmp.8CzWEn6QpY ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.2VsI3nukQp ++ cat /tmp/tmp.8CzWEn6QpY ++ rm /tmp/tmp.2VsI3nukQp /tmp/tmp.8CzWEn6QpY ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 8 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.WrybEgiQBA +++ mktemp ++ local LAST_ERR=/tmp/tmp.pRKxXHwTaK ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.WrybEgiQBA ++ cat /tmp/tmp.pRKxXHwTaK ++ rm /tmp/tmp.WrybEgiQBA /tmp/tmp.pRKxXHwTaK ++ return 0 + [[ ready == \r\e\a\d\y ]] + check_data + local postfix= ++ seq 0 2 + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-16515 '' .svc.cluster.local myApp test + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local postfix= + local suffix=.svc.cluster.local + local database=myApp + local collection=test + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' + run_mongos 'use myApp\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-16515 mongodb .svc.cluster.local + local 'command=use myApp\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local driver=mongodb + local suffix=.svc.cluster.local + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Q4L3PdIeHc +++ mktemp ++ local LAST_ERR=/tmp/tmp.z1DcIxHd9S ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.Q4L3PdIeHc ++ cat /tmp/tmp.z1DcIxHd9S ++ rm /tmp/tmp.Q4L3PdIeHc /tmp/tmp.z1DcIxHd9S ++ return 0 + local client_container=psmdb-client-7469665986-4v9w6 + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.e3i4eDZACH ++ mktemp + local LAST_ERR=/tmp/tmp.7QKgLylBIw + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.e3i4eDZACH + cat /tmp/tmp.7QKgLylBIw + rm /tmp/tmp.e3i4eDZACH /tmp/tmp.7QKgLylBIw + return 0 + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/compare/find.json /tmp/tmp.H4mtct1uIU/find + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-16515 1 .svc.cluster.local myApp1 test + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local postfix=1 + local suffix=.svc.cluster.local + local database=myApp1 + local collection=test + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' + run_mongos 'use myApp1\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-16515 mongodb .svc.cluster.local + local 'command=use myApp1\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local driver=mongodb + local suffix=.svc.cluster.local ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.XeNlJFLru5 +++ mktemp ++ local LAST_ERR=/tmp/tmp.kICJYvltct ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.XeNlJFLru5 ++ cat /tmp/tmp.kICJYvltct ++ rm /tmp/tmp.XeNlJFLru5 /tmp/tmp.kICJYvltct ++ return 0 + local client_container=psmdb-client-7469665986-4v9w6 + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp1\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.nfmZsIMmAy ++ mktemp + local LAST_ERR=/tmp/tmp.V1ABSCAROq + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp1\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.nfmZsIMmAy + cat /tmp/tmp.V1ABSCAROq + rm /tmp/tmp.nfmZsIMmAy /tmp/tmp.V1ABSCAROq + return 0 + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/compare/find1.json /tmp/tmp.H4mtct1uIU/find1 + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-16515 2 .svc.cluster.local myApp2 test + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local postfix=2 + local suffix=.svc.cluster.local + local database=myApp2 + local collection=test + run_mongos 'use myApp2\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-16515 mongodb .svc.cluster.local + local 'command=use myApp2\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-16515 + local driver=mongodb + local suffix=.svc.cluster.local + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.E831BtZMbr +++ mktemp ++ local LAST_ERR=/tmp/tmp.UBcyyor5gF ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.E831BtZMbr ++ cat /tmp/tmp.UBcyyor5gF ++ rm /tmp/tmp.E831BtZMbr /tmp/tmp.UBcyyor5gF ++ return 0 + local client_container=psmdb-client-7469665986-4v9w6 + local mongo_flag= + kubectl_bin exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp2\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.2turBQJ989 ++ mktemp + local LAST_ERR=/tmp/tmp.V7VyXgQ3j2 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-7469665986-4v9w6 -- bash -c 'printf '\''use myApp2\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-16515.svc.cluster.local/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.2turBQJ989 + cat /tmp/tmp.V7VyXgQ3j2 + rm /tmp/tmp.2turBQJ989 /tmp/tmp.V7VyXgQ3j2 + return 0 + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/demand-backup-sharded/compare/find2.json /tmp/tmp.H4mtct1uIU/find2 + desc 'delete backup and check if it is removed from bucket -- minio' + set +o xtrace ----------------------------------------------------------------------------------- delete backup and check if it is removed from bucket -- minio ----------------------------------------------------------------------------------- + kubectl_bin delete psmdb-backup --all ++ mktemp + local LAST_OUT=/tmp/tmp.UKZ1PQr6ob ++ mktemp + local LAST_ERR=/tmp/tmp.tvnXIGmb2Q + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete psmdb-backup --all + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.UKZ1PQr6ob perconaservermongodbbackup.psmdb.percona.com "backup-aws-s3" deleted perconaservermongodbbackup.psmdb.percona.com "backup-azure-blob" deleted perconaservermongodbbackup.psmdb.percona.com "backup-gcp-cs" deleted perconaservermongodbbackup.psmdb.percona.com "backup-minio" deleted + cat /tmp/tmp.tvnXIGmb2Q + rm /tmp/tmp.UKZ1PQr6ob /tmp/tmp.tvnXIGmb2Q + return 0 ++ kubectl_bin run -i --rm aws-cli --image=perconalab/awscli --restart=Never -- /usr/bin/env AWS_ACCESS_KEY_ID=some-access-key AWS_SECRET_ACCESS_KEY=some-secret-key AWS_DEFAULT_REGION=us-east-1 /usr/bin/aws --endpoint-url http://minio-service:9000 s3 ls s3://operator-testing/ ++ grep -c operator-testing/2024-05-29T13:35:08Z_ ++ cat +++ mktemp ++ local LAST_OUT=/tmp/tmp.9nWJmeEWMA +++ mktemp ++ local LAST_ERR=/tmp/tmp.1TPleUgeur ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl run -i --rm aws-cli --image=perconalab/awscli --restart=Never -- /usr/bin/env AWS_ACCESS_KEY_ID=some-access-key AWS_SECRET_ACCESS_KEY=some-secret-key AWS_DEFAULT_REGION=us-east-1 /usr/bin/aws --endpoint-url http://minio-service:9000 s3 ls s3://operator-testing/ ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.9nWJmeEWMA ++ cat /tmp/tmp.1TPleUgeur If you don't see a command prompt, try pressing enter. warning: couldn't attach to pod/aws-cli, falling back to streaming logs: unable to upgrade connection: container aws-cli not found in pod aws-cli_demand-backup-sharded-16515 ++ rm /tmp/tmp.9nWJmeEWMA /tmp/tmp.1TPleUgeur ++ return 0 + backup_exists=0 + [[ 0 -eq 1 ]] + '[' -z '' ']' + check_backup_deletion https://s3.amazonaws.com/operator-testing/psmdb-demand-backup-sharded/2024-05-29T13:35:51Z aws-s3 + path=https://s3.amazonaws.com/operator-testing/psmdb-demand-backup-sharded/2024-05-29T13:35:51Z + storage_name=aws-s3 + retry=0 ++ curl -sw '%{http_code}' -o /dev/null https://s3.amazonaws.com/operator-testing/psmdb-demand-backup-sharded/2024-05-29T13:35:51Z + [[ 403 -eq 403 ]] + check_backup_deletion https://storage.googleapis.com/operator-testing/psmdb-demand-backup-sharded/2024-05-29T13:36:34Z gcp-cs + path=https://storage.googleapis.com/operator-testing/psmdb-demand-backup-sharded/2024-05-29T13:36:34Z + storage_name=gcp-cs + retry=0 ++ curl -sw '%{http_code}' -o /dev/null https://storage.googleapis.com/operator-testing/psmdb-demand-backup-sharded/2024-05-29T13:36:34Z + [[ 404 -eq 403 ]] ++ curl -sw '%{http_code}' -o /dev/null https://storage.googleapis.com/operator-testing/psmdb-demand-backup-sharded/2024-05-29T13:36:34Z + [[ 404 -eq 404 ]] + check_backup_deletion https://engk8soperators.blob.core.windows.net/operator-testing/psmdb-demand-backup-sharded/2024-05-29T13:37:11Z azure-blob + path=https://engk8soperators.blob.core.windows.net/operator-testing/psmdb-demand-backup-sharded/2024-05-29T13:37:11Z + storage_name=azure-blob + retry=0 ++ curl -sw '%{http_code}' -o /dev/null https://engk8soperators.blob.core.windows.net/operator-testing/psmdb-demand-backup-sharded/2024-05-29T13:37:11Z + [[ 404 -eq 403 ]] ++ curl -sw '%{http_code}' -o /dev/null https://engk8soperators.blob.core.windows.net/operator-testing/psmdb-demand-backup-sharded/2024-05-29T13:37:11Z + [[ 404 -eq 404 ]] + desc 'check for passwords leak' + set +o xtrace ----------------------------------------------------------------------------------- check for passwords leak ----------------------------------------------------------------------------------- + check_passwords_leak + local secrets + local passwords + local pods ++ kubectl_bin get secrets -o json ++ jq -r '.items[].data | to_entries | .[] | select(.key | (contains("_PASSWORD"))) | .value' +++ mktemp ++ local LAST_OUT=/tmp/tmp.e7jxx8uN21 +++ mktemp ++ local LAST_ERR=/tmp/tmp.5sq7EMppdT ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get secrets -o json ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.e7jxx8uN21 ++ cat /tmp/tmp.5sq7EMppdT ++ rm /tmp/tmp.e7jxx8uN21 /tmp/tmp.5sq7EMppdT ++ return 0 + secrets='YmFja3VwMTIzNDU2 Y2x1c3RlckFkbWluMTIzNDU2 Y2x1c3Rlck1vbml0b3IxMjM0NTY= ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== dXNlckFkbWluMTIzNDU2 YmFja3VwMTIzNDU2 Y2x1c3RlckFkbWluMTIzNDU2 Y2x1c3Rlck1vbml0b3IxMjM0NTY= ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== dXNlckFkbWluMTIzNDU2' + echo secrets=YmFja3VwMTIzNDU2 Y2x1c3RlckFkbWluMTIzNDU2 Y2x1c3Rlck1vbml0b3IxMjM0NTY= ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== dXNlckFkbWluMTIzNDU2 YmFja3VwMTIzNDU2 Y2x1c3RlckFkbWluMTIzNDU2 Y2x1c3Rlck1vbml0b3IxMjM0NTY= ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== dXNlckFkbWluMTIzNDU2 secrets=YmFja3VwMTIzNDU2 Y2x1c3RlckFkbWluMTIzNDU2 Y2x1c3Rlck1vbml0b3IxMjM0NTY= ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== dXNlckFkbWluMTIzNDU2 YmFja3VwMTIzNDU2 Y2x1c3RlckFkbWluMTIzNDU2 Y2x1c3Rlck1vbml0b3IxMjM0NTY= ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== dXNlckFkbWluMTIzNDU2 ++ for i in '$secrets' ++ base64 -d ++ echo ++ for i in '$secrets' ++ base64 -d ++ echo ++ for i in '$secrets' ++ base64 -d ++ echo ++ for i in '$secrets' ++ base64 -d ++ echo ++ for i in '$secrets' ++ base64 -d ++ echo ++ for i in '$secrets' ++ base64 -d ++ echo ++ for i in '$secrets' ++ base64 -d ++ echo ++ for i in '$secrets' ++ base64 -d ++ echo ++ for i in '$secrets' ++ base64 -d ++ echo ++ for i in '$secrets' ++ base64 -d ++ echo + passwords='backup123456 clusterAdmin123456 clusterMonitor123456 databaseAdmin123456 userAdmin123456 backup123456 clusterAdmin123456 clusterMonitor123456 databaseAdmin123456 userAdmin123456 YmFja3VwMTIzNDU2 Y2x1c3RlckFkbWluMTIzNDU2 Y2x1c3Rlck1vbml0b3IxMjM0NTY= ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== dXNlckFkbWluMTIzNDU2 YmFja3VwMTIzNDU2 Y2x1c3RlckFkbWluMTIzNDU2 Y2x1c3Rlck1vbml0b3IxMjM0NTY= ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== dXNlckFkbWluMTIzNDU2' + echo passwords=backup123456 clusterAdmin123456 clusterMonitor123456 databaseAdmin123456 userAdmin123456 backup123456 clusterAdmin123456 clusterMonitor123456 databaseAdmin123456 userAdmin123456 YmFja3VwMTIzNDU2 Y2x1c3RlckFkbWluMTIzNDU2 Y2x1c3Rlck1vbml0b3IxMjM0NTY= ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== dXNlckFkbWluMTIzNDU2 YmFja3VwMTIzNDU2 Y2x1c3RlckFkbWluMTIzNDU2 Y2x1c3Rlck1vbml0b3IxMjM0NTY= ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== dXNlckFkbWluMTIzNDU2 passwords=backup123456 clusterAdmin123456 clusterMonitor123456 databaseAdmin123456 userAdmin123456 backup123456 clusterAdmin123456 clusterMonitor123456 databaseAdmin123456 userAdmin123456 YmFja3VwMTIzNDU2 Y2x1c3RlckFkbWluMTIzNDU2 Y2x1c3Rlck1vbml0b3IxMjM0NTY= ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== dXNlckFkbWluMTIzNDU2 YmFja3VwMTIzNDU2 Y2x1c3RlckFkbWluMTIzNDU2 Y2x1c3Rlck1vbml0b3IxMjM0NTY= ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== dXNlckFkbWluMTIzNDU2 ++ kubectl_bin get pods -o name +++ mktemp ++ awk -F / '{print $2}' ++ local LAST_OUT=/tmp/tmp.zOGrgCUWRB +++ mktemp ++ local LAST_ERR=/tmp/tmp.ZDj4LVAF5s ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods -o name ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.zOGrgCUWRB ++ cat /tmp/tmp.ZDj4LVAF5s ++ rm /tmp/tmp.zOGrgCUWRB /tmp/tmp.ZDj4LVAF5s ++ return 0 + pods='minio-service-57dd49b-nfqp7 psmdb-client-7469665986-4v9w6 some-name-cfg-0 some-name-cfg-1 some-name-cfg-2 some-name-mongos-0 some-name-mongos-1 some-name-mongos-2 some-name-rs0-0 some-name-rs0-1 some-name-rs0-2 some-name-rs1-0 some-name-rs1-1 some-name-rs1-2 some-name-rs2-0 some-name-rs2-1 some-name-rs2-2' + echo pods=minio-service-57dd49b-nfqp7 psmdb-client-7469665986-4v9w6 some-name-cfg-0 some-name-cfg-1 some-name-cfg-2 some-name-mongos-0 some-name-mongos-1 some-name-mongos-2 some-name-rs0-0 some-name-rs0-1 some-name-rs0-2 some-name-rs1-0 some-name-rs1-1 some-name-rs1-2 some-name-rs2-0 some-name-rs2-1 some-name-rs2-2 pods=minio-service-57dd49b-nfqp7 psmdb-client-7469665986-4v9w6 some-name-cfg-0 some-name-cfg-1 some-name-cfg-2 some-name-mongos-0 some-name-mongos-1 some-name-mongos-2 some-name-rs0-0 some-name-rs0-1 some-name-rs0-2 some-name-rs1-0 some-name-rs1-1 some-name-rs1-2 some-name-rs2-0 some-name-rs2-1 some-name-rs2-2 + collect_logs demand-backup-sharded-16515 + local containers + local count + NS=demand-backup-sharded-16515 + for p in '$pods' ++ kubectl_bin -n demand-backup-sharded-16515 get pod minio-service-57dd49b-nfqp7 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.WgRAYHHNRV +++ mktemp ++ local LAST_ERR=/tmp/tmp.b1oFbCaBJa ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n demand-backup-sharded-16515 get pod minio-service-57dd49b-nfqp7 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.WgRAYHHNRV ++ cat /tmp/tmp.b1oFbCaBJa ++ rm /tmp/tmp.WgRAYHHNRV /tmp/tmp.b1oFbCaBJa ++ return 0 + containers=minio + for c in '$containers' + [[ minio =~ pmm ]] + kubectl_bin -n demand-backup-sharded-16515 logs minio-service-57dd49b-nfqp7 -c minio ++ mktemp + local LAST_OUT=/tmp/tmp.vCdR46ylc8 ++ mktemp + local LAST_ERR=/tmp/tmp.byKPit6pDR + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-16515 logs minio-service-57dd49b-nfqp7 -c minio + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.vCdR46ylc8 + cat /tmp/tmp.byKPit6pDR + rm /tmp/tmp.vCdR46ylc8 /tmp/tmp.byKPit6pDR + return 0 + echo logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-minio-service-57dd49b-nfqp7-minio.txt logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-minio-service-57dd49b-nfqp7-minio.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-minio-service-57dd49b-nfqp7-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-minio-service-57dd49b-nfqp7-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-minio-service-57dd49b-nfqp7-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-minio-service-57dd49b-nfqp7-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-minio-service-57dd49b-nfqp7-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-minio-service-57dd49b-nfqp7-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-minio-service-57dd49b-nfqp7-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-minio-service-57dd49b-nfqp7-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-minio-service-57dd49b-nfqp7-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-minio-service-57dd49b-nfqp7-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-minio-service-57dd49b-nfqp7-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-minio-service-57dd49b-nfqp7-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-minio-service-57dd49b-nfqp7-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-minio-service-57dd49b-nfqp7-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-minio-service-57dd49b-nfqp7-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-minio-service-57dd49b-nfqp7-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-minio-service-57dd49b-nfqp7-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-minio-service-57dd49b-nfqp7-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-minio-service-57dd49b-nfqp7-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-minio-service-57dd49b-nfqp7-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' ++ kubectl_bin -n demand-backup-sharded-16515 get pod psmdb-client-7469665986-4v9w6 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.PhVKvWo9qW +++ mktemp ++ local LAST_ERR=/tmp/tmp.ft5aQhFVwv ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n demand-backup-sharded-16515 get pod psmdb-client-7469665986-4v9w6 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.PhVKvWo9qW ++ cat /tmp/tmp.ft5aQhFVwv ++ rm /tmp/tmp.PhVKvWo9qW /tmp/tmp.ft5aQhFVwv ++ return 0 + containers=psmdb-client + for c in '$containers' + [[ psmdb-client =~ pmm ]] + kubectl_bin -n demand-backup-sharded-16515 logs psmdb-client-7469665986-4v9w6 -c psmdb-client ++ mktemp + local LAST_OUT=/tmp/tmp.RyFM3aqLzw ++ mktemp + local LAST_ERR=/tmp/tmp.MjpGfAHkaF + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-16515 logs psmdb-client-7469665986-4v9w6 -c psmdb-client + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.RyFM3aqLzw + cat /tmp/tmp.MjpGfAHkaF + rm /tmp/tmp.RyFM3aqLzw /tmp/tmp.MjpGfAHkaF + return 0 + echo logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-psmdb-client-7469665986-4v9w6-psmdb-client.txt logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-psmdb-client-7469665986-4v9w6-psmdb-client.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-psmdb-client-7469665986-4v9w6-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-psmdb-client-7469665986-4v9w6-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-psmdb-client-7469665986-4v9w6-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-psmdb-client-7469665986-4v9w6-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-psmdb-client-7469665986-4v9w6-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-psmdb-client-7469665986-4v9w6-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-psmdb-client-7469665986-4v9w6-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-psmdb-client-7469665986-4v9w6-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-psmdb-client-7469665986-4v9w6-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-psmdb-client-7469665986-4v9w6-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-psmdb-client-7469665986-4v9w6-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-psmdb-client-7469665986-4v9w6-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-psmdb-client-7469665986-4v9w6-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-psmdb-client-7469665986-4v9w6-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-psmdb-client-7469665986-4v9w6-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-psmdb-client-7469665986-4v9w6-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-psmdb-client-7469665986-4v9w6-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-psmdb-client-7469665986-4v9w6-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-psmdb-client-7469665986-4v9w6-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-psmdb-client-7469665986-4v9w6-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' ++ kubectl_bin -n demand-backup-sharded-16515 get pod some-name-cfg-0 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.UpZKZsBXrS +++ mktemp ++ local LAST_ERR=/tmp/tmp.cZcHWVXw7t ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n demand-backup-sharded-16515 get pod some-name-cfg-0 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.UpZKZsBXrS ++ cat /tmp/tmp.cZcHWVXw7t ++ rm /tmp/tmp.UpZKZsBXrS /tmp/tmp.cZcHWVXw7t ++ return 0 + containers='mongod cfg-sidecar-1 backup-agent' + for c in '$containers' + [[ mongod =~ pmm ]] + kubectl_bin -n demand-backup-sharded-16515 logs some-name-cfg-0 -c mongod ++ mktemp + local LAST_OUT=/tmp/tmp.jkQqoS0LE5 ++ mktemp + local LAST_ERR=/tmp/tmp.hLHKd34PuJ + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-16515 logs some-name-cfg-0 -c mongod + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.jkQqoS0LE5 + cat /tmp/tmp.hLHKd34PuJ + rm /tmp/tmp.jkQqoS0LE5 /tmp/tmp.hLHKd34PuJ + return 0 + echo logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-mongod.txt logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-mongod.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ cfg-sidecar-1 =~ pmm ]] + kubectl_bin -n demand-backup-sharded-16515 logs some-name-cfg-0 -c cfg-sidecar-1 ++ mktemp + local LAST_OUT=/tmp/tmp.sDE623fUpF ++ mktemp + local LAST_ERR=/tmp/tmp.Elpj1FARZs + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-16515 logs some-name-cfg-0 -c cfg-sidecar-1 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.sDE623fUpF + cat /tmp/tmp.Elpj1FARZs + rm /tmp/tmp.sDE623fUpF /tmp/tmp.Elpj1FARZs + return 0 + echo logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-cfg-sidecar-1.txt logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-cfg-sidecar-1.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ backup-agent =~ pmm ]] + kubectl_bin -n demand-backup-sharded-16515 logs some-name-cfg-0 -c backup-agent ++ mktemp + local LAST_OUT=/tmp/tmp.HUUbJNQFR8 ++ mktemp + local LAST_ERR=/tmp/tmp.9BWgq1x5nY + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-16515 logs some-name-cfg-0 -c backup-agent + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.HUUbJNQFR8 + cat /tmp/tmp.9BWgq1x5nY + rm /tmp/tmp.HUUbJNQFR8 /tmp/tmp.9BWgq1x5nY + return 0 + echo logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-backup-agent.txt logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-backup-agent.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' ++ kubectl_bin -n demand-backup-sharded-16515 get pod some-name-cfg-1 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.q1GekDWa01 +++ mktemp ++ local LAST_ERR=/tmp/tmp.2RrEwyIr50 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n demand-backup-sharded-16515 get pod some-name-cfg-1 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.q1GekDWa01 ++ cat /tmp/tmp.2RrEwyIr50 ++ rm /tmp/tmp.q1GekDWa01 /tmp/tmp.2RrEwyIr50 ++ return 0 + containers='mongod cfg-sidecar-1 backup-agent' + for c in '$containers' + [[ mongod =~ pmm ]] + kubectl_bin -n demand-backup-sharded-16515 logs some-name-cfg-1 -c mongod ++ mktemp + local LAST_OUT=/tmp/tmp.uoC1jGXyy1 ++ mktemp + local LAST_ERR=/tmp/tmp.mvPKeGgofP + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-16515 logs some-name-cfg-1 -c mongod + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.uoC1jGXyy1 + cat /tmp/tmp.mvPKeGgofP + rm /tmp/tmp.uoC1jGXyy1 /tmp/tmp.mvPKeGgofP + return 0 + echo logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-mongod.txt logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-mongod.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ cfg-sidecar-1 =~ pmm ]] + kubectl_bin -n demand-backup-sharded-16515 logs some-name-cfg-1 -c cfg-sidecar-1 ++ mktemp + local LAST_OUT=/tmp/tmp.ffMh5ABXcO ++ mktemp + local LAST_ERR=/tmp/tmp.SW7GcoExvU + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-16515 logs some-name-cfg-1 -c cfg-sidecar-1 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.ffMh5ABXcO + cat /tmp/tmp.SW7GcoExvU + rm /tmp/tmp.ffMh5ABXcO /tmp/tmp.SW7GcoExvU + return 0 + echo logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-cfg-sidecar-1.txt logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-cfg-sidecar-1.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ backup-agent =~ pmm ]] + kubectl_bin -n demand-backup-sharded-16515 logs some-name-cfg-1 -c backup-agent ++ mktemp + local LAST_OUT=/tmp/tmp.QblSzB5PyK ++ mktemp + local LAST_ERR=/tmp/tmp.gGfjMTghGc + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-16515 logs some-name-cfg-1 -c backup-agent + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.QblSzB5PyK + cat /tmp/tmp.gGfjMTghGc + rm /tmp/tmp.QblSzB5PyK /tmp/tmp.gGfjMTghGc + return 0 + echo logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-backup-agent.txt logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-backup-agent.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' ++ kubectl_bin -n demand-backup-sharded-16515 get pod some-name-cfg-2 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.obUTqzz9dV +++ mktemp ++ local LAST_ERR=/tmp/tmp.vSMuajmMyQ ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n demand-backup-sharded-16515 get pod some-name-cfg-2 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.obUTqzz9dV ++ cat /tmp/tmp.vSMuajmMyQ ++ rm /tmp/tmp.obUTqzz9dV /tmp/tmp.vSMuajmMyQ ++ return 0 + containers='mongod cfg-sidecar-1 backup-agent' + for c in '$containers' + [[ mongod =~ pmm ]] + kubectl_bin -n demand-backup-sharded-16515 logs some-name-cfg-2 -c mongod ++ mktemp + local LAST_OUT=/tmp/tmp.fPVjllLEoG ++ mktemp + local LAST_ERR=/tmp/tmp.KYnXRpqTh6 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-16515 logs some-name-cfg-2 -c mongod + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.fPVjllLEoG + cat /tmp/tmp.KYnXRpqTh6 + rm /tmp/tmp.fPVjllLEoG /tmp/tmp.KYnXRpqTh6 + return 0 + echo logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-mongod.txt logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-mongod.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ cfg-sidecar-1 =~ pmm ]] + kubectl_bin -n demand-backup-sharded-16515 logs some-name-cfg-2 -c cfg-sidecar-1 ++ mktemp + local LAST_OUT=/tmp/tmp.Bs4xyNh2Uq ++ mktemp + local LAST_ERR=/tmp/tmp.h2TiTjo74g + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-16515 logs some-name-cfg-2 -c cfg-sidecar-1 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.Bs4xyNh2Uq + cat /tmp/tmp.h2TiTjo74g + rm /tmp/tmp.Bs4xyNh2Uq /tmp/tmp.h2TiTjo74g + return 0 + echo logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-cfg-sidecar-1.txt logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-cfg-sidecar-1.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ backup-agent =~ pmm ]] + kubectl_bin -n demand-backup-sharded-16515 logs some-name-cfg-2 -c backup-agent ++ mktemp + local LAST_OUT=/tmp/tmp.0A92IWOcfJ ++ mktemp + local LAST_ERR=/tmp/tmp.lfOiMUw42o + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-16515 logs some-name-cfg-2 -c backup-agent + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.0A92IWOcfJ + cat /tmp/tmp.lfOiMUw42o + rm /tmp/tmp.0A92IWOcfJ /tmp/tmp.lfOiMUw42o + return 0 + echo logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-backup-agent.txt logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-backup-agent.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' ++ kubectl_bin -n demand-backup-sharded-16515 get pod some-name-mongos-0 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.1jb8Stn7RI +++ mktemp ++ local LAST_ERR=/tmp/tmp.IZqthxF2EU ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n demand-backup-sharded-16515 get pod some-name-mongos-0 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.1jb8Stn7RI ++ cat /tmp/tmp.IZqthxF2EU ++ rm /tmp/tmp.1jb8Stn7RI /tmp/tmp.IZqthxF2EU ++ return 0 + containers='mongos mongos-sidecar-1' + for c in '$containers' + [[ mongos =~ pmm ]] + kubectl_bin -n demand-backup-sharded-16515 logs some-name-mongos-0 -c mongos ++ mktemp + local LAST_OUT=/tmp/tmp.YVs8Z9S8tJ ++ mktemp + local LAST_ERR=/tmp/tmp.pwwSzNyYmY + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-16515 logs some-name-mongos-0 -c mongos + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.YVs8Z9S8tJ + cat /tmp/tmp.pwwSzNyYmY + rm /tmp/tmp.YVs8Z9S8tJ /tmp/tmp.pwwSzNyYmY + return 0 + echo logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-0-mongos.txt logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-0-mongos.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ mongos-sidecar-1 =~ pmm ]] + kubectl_bin -n demand-backup-sharded-16515 logs some-name-mongos-0 -c mongos-sidecar-1 ++ mktemp + local LAST_OUT=/tmp/tmp.0Z6aU2vvk9 ++ mktemp + local LAST_ERR=/tmp/tmp.6tQiRYTTiw + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-16515 logs some-name-mongos-0 -c mongos-sidecar-1 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.0Z6aU2vvk9 + cat /tmp/tmp.6tQiRYTTiw + rm /tmp/tmp.0Z6aU2vvk9 /tmp/tmp.6tQiRYTTiw + return 0 + echo logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-0-mongos-sidecar-1.txt logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-0-mongos-sidecar-1.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' ++ kubectl_bin -n demand-backup-sharded-16515 get pod some-name-mongos-1 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.XrdGurGkJB +++ mktemp ++ local LAST_ERR=/tmp/tmp.sU07FFGoNv ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n demand-backup-sharded-16515 get pod some-name-mongos-1 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.XrdGurGkJB ++ cat /tmp/tmp.sU07FFGoNv ++ rm /tmp/tmp.XrdGurGkJB /tmp/tmp.sU07FFGoNv ++ return 0 + containers='mongos mongos-sidecar-1' + for c in '$containers' + [[ mongos =~ pmm ]] + kubectl_bin -n demand-backup-sharded-16515 logs some-name-mongos-1 -c mongos ++ mktemp + local LAST_OUT=/tmp/tmp.gpPykwckgw ++ mktemp + local LAST_ERR=/tmp/tmp.sg4CtjwPJ6 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-16515 logs some-name-mongos-1 -c mongos + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.gpPykwckgw + cat /tmp/tmp.sg4CtjwPJ6 + rm /tmp/tmp.gpPykwckgw /tmp/tmp.sg4CtjwPJ6 + return 0 + echo logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-1-mongos.txt logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-1-mongos.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ mongos-sidecar-1 =~ pmm ]] + kubectl_bin -n demand-backup-sharded-16515 logs some-name-mongos-1 -c mongos-sidecar-1 ++ mktemp + local LAST_OUT=/tmp/tmp.rt0Di48Qr7 ++ mktemp + local LAST_ERR=/tmp/tmp.n5dkzLkjcy + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-16515 logs some-name-mongos-1 -c mongos-sidecar-1 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.rt0Di48Qr7 + cat /tmp/tmp.n5dkzLkjcy + rm /tmp/tmp.rt0Di48Qr7 /tmp/tmp.n5dkzLkjcy + return 0 + echo logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-1-mongos-sidecar-1.txt logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-1-mongos-sidecar-1.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' ++ kubectl_bin -n demand-backup-sharded-16515 get pod some-name-mongos-2 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.2koxveI6jx +++ mktemp ++ local LAST_ERR=/tmp/tmp.jhMHdotVUp ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n demand-backup-sharded-16515 get pod some-name-mongos-2 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.2koxveI6jx ++ cat /tmp/tmp.jhMHdotVUp ++ rm /tmp/tmp.2koxveI6jx /tmp/tmp.jhMHdotVUp ++ return 0 + containers='mongos mongos-sidecar-1' + for c in '$containers' + [[ mongos =~ pmm ]] + kubectl_bin -n demand-backup-sharded-16515 logs some-name-mongos-2 -c mongos ++ mktemp + local LAST_OUT=/tmp/tmp.d2o47xuyJz ++ mktemp + local LAST_ERR=/tmp/tmp.lNog0cxcfz + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-16515 logs some-name-mongos-2 -c mongos + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.d2o47xuyJz + cat /tmp/tmp.lNog0cxcfz + rm /tmp/tmp.d2o47xuyJz /tmp/tmp.lNog0cxcfz + return 0 + echo logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-2-mongos.txt logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-2-mongos.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ mongos-sidecar-1 =~ pmm ]] + kubectl_bin -n demand-backup-sharded-16515 logs some-name-mongos-2 -c mongos-sidecar-1 ++ mktemp + local LAST_OUT=/tmp/tmp.52z6JE0L89 ++ mktemp + local LAST_ERR=/tmp/tmp.KYXS3xyXpq + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-16515 logs some-name-mongos-2 -c mongos-sidecar-1 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.52z6JE0L89 + cat /tmp/tmp.KYXS3xyXpq + rm /tmp/tmp.52z6JE0L89 /tmp/tmp.KYXS3xyXpq + return 0 + echo logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-2-mongos-sidecar-1.txt logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-2-mongos-sidecar-1.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' ++ kubectl_bin -n demand-backup-sharded-16515 get pod some-name-rs0-0 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.8d8hfMBag3 +++ mktemp ++ local LAST_ERR=/tmp/tmp.bzLOrZZBpj ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n demand-backup-sharded-16515 get pod some-name-rs0-0 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.8d8hfMBag3 ++ cat /tmp/tmp.bzLOrZZBpj ++ rm /tmp/tmp.8d8hfMBag3 /tmp/tmp.bzLOrZZBpj ++ return 0 + containers='mongod backup-agent' + for c in '$containers' + [[ mongod =~ pmm ]] + kubectl_bin -n demand-backup-sharded-16515 logs some-name-rs0-0 -c mongod ++ mktemp + local LAST_OUT=/tmp/tmp.Ic2il75qOQ ++ mktemp + local LAST_ERR=/tmp/tmp.givbVwAYHT + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-16515 logs some-name-rs0-0 -c mongod + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.Ic2il75qOQ + cat /tmp/tmp.givbVwAYHT + rm /tmp/tmp.Ic2il75qOQ /tmp/tmp.givbVwAYHT + return 0 + echo logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-0-mongod.txt logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-0-mongod.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ backup-agent =~ pmm ]] + kubectl_bin -n demand-backup-sharded-16515 logs some-name-rs0-0 -c backup-agent ++ mktemp + local LAST_OUT=/tmp/tmp.VsjLAMC8AU ++ mktemp + local LAST_ERR=/tmp/tmp.HSDmTeuLZ2 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-16515 logs some-name-rs0-0 -c backup-agent + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.VsjLAMC8AU + cat /tmp/tmp.HSDmTeuLZ2 + rm /tmp/tmp.VsjLAMC8AU /tmp/tmp.HSDmTeuLZ2 + return 0 + echo logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-0-backup-agent.txt logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-0-backup-agent.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' ++ kubectl_bin -n demand-backup-sharded-16515 get pod some-name-rs0-1 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.fdKkbvZEVA +++ mktemp ++ local LAST_ERR=/tmp/tmp.4lDbef8guu ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n demand-backup-sharded-16515 get pod some-name-rs0-1 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.fdKkbvZEVA ++ cat /tmp/tmp.4lDbef8guu ++ rm /tmp/tmp.fdKkbvZEVA /tmp/tmp.4lDbef8guu ++ return 0 + containers='mongod backup-agent' + for c in '$containers' + [[ mongod =~ pmm ]] + kubectl_bin -n demand-backup-sharded-16515 logs some-name-rs0-1 -c mongod ++ mktemp + local LAST_OUT=/tmp/tmp.W0GCieBdzN ++ mktemp + local LAST_ERR=/tmp/tmp.B2iITgRngH + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-16515 logs some-name-rs0-1 -c mongod + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.W0GCieBdzN + cat /tmp/tmp.B2iITgRngH + rm /tmp/tmp.W0GCieBdzN /tmp/tmp.B2iITgRngH + return 0 + echo logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-1-mongod.txt logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-1-mongod.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ backup-agent =~ pmm ]] + kubectl_bin -n demand-backup-sharded-16515 logs some-name-rs0-1 -c backup-agent ++ mktemp + local LAST_OUT=/tmp/tmp.jG8bgN9fjj ++ mktemp + local LAST_ERR=/tmp/tmp.ySa0GnDnCL + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-16515 logs some-name-rs0-1 -c backup-agent + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.jG8bgN9fjj + cat /tmp/tmp.ySa0GnDnCL + rm /tmp/tmp.jG8bgN9fjj /tmp/tmp.ySa0GnDnCL + return 0 + echo logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-1-backup-agent.txt logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-1-backup-agent.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' ++ kubectl_bin -n demand-backup-sharded-16515 get pod some-name-rs0-2 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.egdqKtJ3Dx +++ mktemp ++ local LAST_ERR=/tmp/tmp.xL4ycJch1V ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n demand-backup-sharded-16515 get pod some-name-rs0-2 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.egdqKtJ3Dx ++ cat /tmp/tmp.xL4ycJch1V ++ rm /tmp/tmp.egdqKtJ3Dx /tmp/tmp.xL4ycJch1V ++ return 0 + containers='mongod backup-agent' + for c in '$containers' + [[ mongod =~ pmm ]] + kubectl_bin -n demand-backup-sharded-16515 logs some-name-rs0-2 -c mongod ++ mktemp + local LAST_OUT=/tmp/tmp.QGEtcPr7TC ++ mktemp + local LAST_ERR=/tmp/tmp.0SeZ0IY19b + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-16515 logs some-name-rs0-2 -c mongod + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.QGEtcPr7TC + cat /tmp/tmp.0SeZ0IY19b + rm /tmp/tmp.QGEtcPr7TC /tmp/tmp.0SeZ0IY19b + return 0 + echo logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-2-mongod.txt logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-2-mongod.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ backup-agent =~ pmm ]] + kubectl_bin -n demand-backup-sharded-16515 logs some-name-rs0-2 -c backup-agent ++ mktemp + local LAST_OUT=/tmp/tmp.f8uLeFKP3c ++ mktemp + local LAST_ERR=/tmp/tmp.fyZuqn7cvy + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-16515 logs some-name-rs0-2 -c backup-agent + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.f8uLeFKP3c + cat /tmp/tmp.fyZuqn7cvy + rm /tmp/tmp.f8uLeFKP3c /tmp/tmp.fyZuqn7cvy + return 0 + echo logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-2-backup-agent.txt logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-2-backup-agent.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' ++ kubectl_bin -n demand-backup-sharded-16515 get pod some-name-rs1-0 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.YONQiyCD0F +++ mktemp ++ local LAST_ERR=/tmp/tmp.XjFobrkoYS ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n demand-backup-sharded-16515 get pod some-name-rs1-0 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.YONQiyCD0F ++ cat /tmp/tmp.XjFobrkoYS ++ rm /tmp/tmp.YONQiyCD0F /tmp/tmp.XjFobrkoYS ++ return 0 + containers='mongod backup-agent' + for c in '$containers' + [[ mongod =~ pmm ]] + kubectl_bin -n demand-backup-sharded-16515 logs some-name-rs1-0 -c mongod ++ mktemp + local LAST_OUT=/tmp/tmp.FNOjgB0w8X ++ mktemp + local LAST_ERR=/tmp/tmp.hmT2H6ceVh + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-16515 logs some-name-rs1-0 -c mongod + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.FNOjgB0w8X + cat /tmp/tmp.hmT2H6ceVh + rm /tmp/tmp.FNOjgB0w8X /tmp/tmp.hmT2H6ceVh + return 0 + echo logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-0-mongod.txt logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-0-mongod.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ backup-agent =~ pmm ]] + kubectl_bin -n demand-backup-sharded-16515 logs some-name-rs1-0 -c backup-agent ++ mktemp + local LAST_OUT=/tmp/tmp.IRFMrcLwle ++ mktemp + local LAST_ERR=/tmp/tmp.HUpEKakAjv + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-16515 logs some-name-rs1-0 -c backup-agent + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.IRFMrcLwle + cat /tmp/tmp.HUpEKakAjv + rm /tmp/tmp.IRFMrcLwle /tmp/tmp.HUpEKakAjv + return 0 + echo logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-0-backup-agent.txt logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-0-backup-agent.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' ++ kubectl_bin -n demand-backup-sharded-16515 get pod some-name-rs1-1 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.OKgC6maKkz +++ mktemp ++ local LAST_ERR=/tmp/tmp.mvhuwhm1qJ ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n demand-backup-sharded-16515 get pod some-name-rs1-1 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.OKgC6maKkz ++ cat /tmp/tmp.mvhuwhm1qJ ++ rm /tmp/tmp.OKgC6maKkz /tmp/tmp.mvhuwhm1qJ ++ return 0 + containers='mongod backup-agent' + for c in '$containers' + [[ mongod =~ pmm ]] + kubectl_bin -n demand-backup-sharded-16515 logs some-name-rs1-1 -c mongod ++ mktemp + local LAST_OUT=/tmp/tmp.ph6RE9IH4k ++ mktemp + local LAST_ERR=/tmp/tmp.8xS8HFTfG8 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-16515 logs some-name-rs1-1 -c mongod + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.ph6RE9IH4k + cat /tmp/tmp.8xS8HFTfG8 + rm /tmp/tmp.ph6RE9IH4k /tmp/tmp.8xS8HFTfG8 + return 0 + echo logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-1-mongod.txt logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-1-mongod.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ backup-agent =~ pmm ]] + kubectl_bin -n demand-backup-sharded-16515 logs some-name-rs1-1 -c backup-agent ++ mktemp + local LAST_OUT=/tmp/tmp.8S8Xz3shYw ++ mktemp + local LAST_ERR=/tmp/tmp.TgrslWMBCR + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-16515 logs some-name-rs1-1 -c backup-agent + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.8S8Xz3shYw + cat /tmp/tmp.TgrslWMBCR + rm /tmp/tmp.8S8Xz3shYw /tmp/tmp.TgrslWMBCR + return 0 + echo logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-1-backup-agent.txt logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-1-backup-agent.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' ++ kubectl_bin -n demand-backup-sharded-16515 get pod some-name-rs1-2 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.xw1zJ8xx6Q +++ mktemp ++ local LAST_ERR=/tmp/tmp.GbMQn3o803 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n demand-backup-sharded-16515 get pod some-name-rs1-2 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.xw1zJ8xx6Q ++ cat /tmp/tmp.GbMQn3o803 ++ rm /tmp/tmp.xw1zJ8xx6Q /tmp/tmp.GbMQn3o803 ++ return 0 + containers='mongod backup-agent' + for c in '$containers' + [[ mongod =~ pmm ]] + kubectl_bin -n demand-backup-sharded-16515 logs some-name-rs1-2 -c mongod ++ mktemp + local LAST_OUT=/tmp/tmp.fs8g8UIXNM ++ mktemp + local LAST_ERR=/tmp/tmp.n7D4TYuxzX + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-16515 logs some-name-rs1-2 -c mongod + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.fs8g8UIXNM + cat /tmp/tmp.n7D4TYuxzX + rm /tmp/tmp.fs8g8UIXNM /tmp/tmp.n7D4TYuxzX + return 0 + echo logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-2-mongod.txt logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-2-mongod.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ backup-agent =~ pmm ]] + kubectl_bin -n demand-backup-sharded-16515 logs some-name-rs1-2 -c backup-agent ++ mktemp + local LAST_OUT=/tmp/tmp.tV7aIPYUE5 ++ mktemp + local LAST_ERR=/tmp/tmp.BHfnPEM5zs + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-16515 logs some-name-rs1-2 -c backup-agent + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.tV7aIPYUE5 + cat /tmp/tmp.BHfnPEM5zs + rm /tmp/tmp.tV7aIPYUE5 /tmp/tmp.BHfnPEM5zs + return 0 + echo logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-2-backup-agent.txt logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-2-backup-agent.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' ++ kubectl_bin -n demand-backup-sharded-16515 get pod some-name-rs2-0 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.FOT9uzn2p0 +++ mktemp ++ local LAST_ERR=/tmp/tmp.BelIq2wwkP ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n demand-backup-sharded-16515 get pod some-name-rs2-0 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.FOT9uzn2p0 ++ cat /tmp/tmp.BelIq2wwkP ++ rm /tmp/tmp.FOT9uzn2p0 /tmp/tmp.BelIq2wwkP ++ return 0 + containers='mongod rs-sidecar-1 backup-agent' + for c in '$containers' + [[ mongod =~ pmm ]] + kubectl_bin -n demand-backup-sharded-16515 logs some-name-rs2-0 -c mongod ++ mktemp + local LAST_OUT=/tmp/tmp.wbdKIwSZk9 ++ mktemp + local LAST_ERR=/tmp/tmp.kgh0YOADfK + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-16515 logs some-name-rs2-0 -c mongod + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.wbdKIwSZk9 + cat /tmp/tmp.kgh0YOADfK + rm /tmp/tmp.wbdKIwSZk9 /tmp/tmp.kgh0YOADfK + return 0 + echo logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-mongod.txt logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-mongod.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ rs-sidecar-1 =~ pmm ]] + kubectl_bin -n demand-backup-sharded-16515 logs some-name-rs2-0 -c rs-sidecar-1 ++ mktemp + local LAST_OUT=/tmp/tmp.8GTZw0NbX8 ++ mktemp + local LAST_ERR=/tmp/tmp.3guipH1tZW + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-16515 logs some-name-rs2-0 -c rs-sidecar-1 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.8GTZw0NbX8 + cat /tmp/tmp.3guipH1tZW + rm /tmp/tmp.8GTZw0NbX8 /tmp/tmp.3guipH1tZW + return 0 + echo logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-rs-sidecar-1.txt logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-rs-sidecar-1.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ backup-agent =~ pmm ]] + kubectl_bin -n demand-backup-sharded-16515 logs some-name-rs2-0 -c backup-agent ++ mktemp + local LAST_OUT=/tmp/tmp.pZm0aKy7yl ++ mktemp + local LAST_ERR=/tmp/tmp.pP7w2FRS9k + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-16515 logs some-name-rs2-0 -c backup-agent + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.pZm0aKy7yl + cat /tmp/tmp.pP7w2FRS9k + rm /tmp/tmp.pZm0aKy7yl /tmp/tmp.pP7w2FRS9k + return 0 + echo logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-backup-agent.txt logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-backup-agent.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' ++ kubectl_bin -n demand-backup-sharded-16515 get pod some-name-rs2-1 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.OlUO1N52Hs +++ mktemp ++ local LAST_ERR=/tmp/tmp.9unJWe5mjG ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n demand-backup-sharded-16515 get pod some-name-rs2-1 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.OlUO1N52Hs ++ cat /tmp/tmp.9unJWe5mjG ++ rm /tmp/tmp.OlUO1N52Hs /tmp/tmp.9unJWe5mjG ++ return 0 + containers='mongod rs-sidecar-1 backup-agent' + for c in '$containers' + [[ mongod =~ pmm ]] + kubectl_bin -n demand-backup-sharded-16515 logs some-name-rs2-1 -c mongod ++ mktemp + local LAST_OUT=/tmp/tmp.DGk3uaWW3Z ++ mktemp + local LAST_ERR=/tmp/tmp.GhsM6NOzTI + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-16515 logs some-name-rs2-1 -c mongod + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.DGk3uaWW3Z + cat /tmp/tmp.GhsM6NOzTI + rm /tmp/tmp.DGk3uaWW3Z /tmp/tmp.GhsM6NOzTI + return 0 + echo logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-mongod.txt logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-mongod.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ rs-sidecar-1 =~ pmm ]] + kubectl_bin -n demand-backup-sharded-16515 logs some-name-rs2-1 -c rs-sidecar-1 ++ mktemp + local LAST_OUT=/tmp/tmp.xOGgmJNjmY ++ mktemp + local LAST_ERR=/tmp/tmp.1t5UEPcA4C + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-16515 logs some-name-rs2-1 -c rs-sidecar-1 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.xOGgmJNjmY + cat /tmp/tmp.1t5UEPcA4C + rm /tmp/tmp.xOGgmJNjmY /tmp/tmp.1t5UEPcA4C + return 0 + echo logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-rs-sidecar-1.txt logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-rs-sidecar-1.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ backup-agent =~ pmm ]] + kubectl_bin -n demand-backup-sharded-16515 logs some-name-rs2-1 -c backup-agent ++ mktemp + local LAST_OUT=/tmp/tmp.254is0uTzI ++ mktemp + local LAST_ERR=/tmp/tmp.D5rzTGD7Jl + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-16515 logs some-name-rs2-1 -c backup-agent + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.254is0uTzI + cat /tmp/tmp.D5rzTGD7Jl + rm /tmp/tmp.254is0uTzI /tmp/tmp.D5rzTGD7Jl + return 0 + echo logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-backup-agent.txt logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-backup-agent.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' ++ kubectl_bin -n demand-backup-sharded-16515 get pod some-name-rs2-2 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.d7wSwqclT6 +++ mktemp ++ local LAST_ERR=/tmp/tmp.R1Eh3oOGWD ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n demand-backup-sharded-16515 get pod some-name-rs2-2 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.d7wSwqclT6 ++ cat /tmp/tmp.R1Eh3oOGWD ++ rm /tmp/tmp.d7wSwqclT6 /tmp/tmp.R1Eh3oOGWD ++ return 0 + containers='mongod rs-sidecar-1 backup-agent' + for c in '$containers' + [[ mongod =~ pmm ]] + kubectl_bin -n demand-backup-sharded-16515 logs some-name-rs2-2 -c mongod ++ mktemp + local LAST_OUT=/tmp/tmp.6iMXLza3WC ++ mktemp + local LAST_ERR=/tmp/tmp.FY5rkrzsPk + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-16515 logs some-name-rs2-2 -c mongod + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.6iMXLza3WC + cat /tmp/tmp.FY5rkrzsPk + rm /tmp/tmp.6iMXLza3WC /tmp/tmp.FY5rkrzsPk + return 0 + echo logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-mongod.txt logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-mongod.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ rs-sidecar-1 =~ pmm ]] + kubectl_bin -n demand-backup-sharded-16515 logs some-name-rs2-2 -c rs-sidecar-1 ++ mktemp + local LAST_OUT=/tmp/tmp.O1IGp1nKXS ++ mktemp + local LAST_ERR=/tmp/tmp.NpS7v4Y0WB + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-16515 logs some-name-rs2-2 -c rs-sidecar-1 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.O1IGp1nKXS + cat /tmp/tmp.NpS7v4Y0WB + rm /tmp/tmp.O1IGp1nKXS /tmp/tmp.NpS7v4Y0WB + return 0 + echo logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-rs-sidecar-1.txt logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-rs-sidecar-1.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ backup-agent =~ pmm ]] + kubectl_bin -n demand-backup-sharded-16515 logs some-name-rs2-2 -c backup-agent ++ mktemp + local LAST_OUT=/tmp/tmp.97kZbHzQ27 ++ mktemp + local LAST_ERR=/tmp/tmp.lSUotrnH2Y + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-16515 logs some-name-rs2-2 -c backup-agent + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.97kZbHzQ27 + cat /tmp/tmp.lSUotrnH2Y + rm /tmp/tmp.97kZbHzQ27 /tmp/tmp.lSUotrnH2Y + return 0 + echo logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-backup-agent.txt logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-backup-agent.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + '[' -n psmdb-operator ']' ++ kubectl_bin -n psmdb-operator get pods -o name ++ awk -F / '{print $2}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.InKNjXp8XG +++ mktemp ++ local LAST_ERR=/tmp/tmp.6atJU2dk93 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n psmdb-operator get pods -o name ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.InKNjXp8XG ++ cat /tmp/tmp.6atJU2dk93 ++ rm /tmp/tmp.InKNjXp8XG /tmp/tmp.6atJU2dk93 ++ return 0 + pods=percona-server-mongodb-operator-9f9787b4c-mkzqz + collect_logs psmdb-operator + local containers + local count + NS=psmdb-operator + for p in '$pods' ++ kubectl_bin -n psmdb-operator get pod percona-server-mongodb-operator-9f9787b4c-mkzqz -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.PaMvBFWDZO +++ mktemp ++ local LAST_ERR=/tmp/tmp.UIZADVsCEM ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n psmdb-operator get pod percona-server-mongodb-operator-9f9787b4c-mkzqz -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.PaMvBFWDZO ++ cat /tmp/tmp.UIZADVsCEM ++ rm /tmp/tmp.PaMvBFWDZO /tmp/tmp.UIZADVsCEM ++ return 0 + containers=percona-server-mongodb-operator + for c in '$containers' + [[ percona-server-mongodb-operator =~ pmm ]] + kubectl_bin -n psmdb-operator logs percona-server-mongodb-operator-9f9787b4c-mkzqz -c percona-server-mongodb-operator ++ mktemp + local LAST_OUT=/tmp/tmp.M033VSD9h1 ++ mktemp + local LAST_ERR=/tmp/tmp.AZUsCU3ktz + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n psmdb-operator logs percona-server-mongodb-operator-9f9787b4c-mkzqz -c percona-server-mongodb-operator + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.M033VSD9h1 + cat /tmp/tmp.AZUsCU3ktz + rm /tmp/tmp.M033VSD9h1 /tmp/tmp.AZUsCU3ktz + return 0 + echo logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-percona-server-mongodb-operator-9f9787b4c-mkzqz-percona-server-mongodb-operator.txt logs saved in: /tmp/tmp.H4mtct1uIU/logs_output-percona-server-mongodb-operator-9f9787b4c-mkzqz-percona-server-mongodb-operator.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-percona-server-mongodb-operator-9f9787b4c-mkzqz-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-percona-server-mongodb-operator-9f9787b4c-mkzqz-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-percona-server-mongodb-operator-9f9787b4c-mkzqz-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-percona-server-mongodb-operator-9f9787b4c-mkzqz-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-percona-server-mongodb-operator-9f9787b4c-mkzqz-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.H4mtct1uIU/logs_output-percona-server-mongodb-operator-9f9787b4c-mkzqz-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-percona-server-mongodb-operator-9f9787b4c-mkzqz-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.H4mtct1uIU/logs_output-percona-server-mongodb-operator-9f9787b4c-mkzqz-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-percona-server-mongodb-operator-9f9787b4c-mkzqz-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.H4mtct1uIU/logs_output-percona-server-mongodb-operator-9f9787b4c-mkzqz-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-percona-server-mongodb-operator-9f9787b4c-mkzqz-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-percona-server-mongodb-operator-9f9787b4c-mkzqz-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-percona-server-mongodb-operator-9f9787b4c-mkzqz-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-percona-server-mongodb-operator-9f9787b4c-mkzqz-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-percona-server-mongodb-operator-9f9787b4c-mkzqz-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-percona-server-mongodb-operator-9f9787b4c-mkzqz-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-percona-server-mongodb-operator-9f9787b4c-mkzqz-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.H4mtct1uIU/logs_output-percona-server-mongodb-operator-9f9787b4c-mkzqz-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.H4mtct1uIU/logs_output-percona-server-mongodb-operator-9f9787b4c-mkzqz-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.H4mtct1uIU/logs_output-percona-server-mongodb-operator-9f9787b4c-mkzqz-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + kubectl_bin delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/conf/container-rc.yaml ++ mktemp + local LAST_OUT=/tmp/tmp.zvKeKZZN5j ++ mktemp + local LAST_ERR=/tmp/tmp.BF6DdImeT8 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/e2e-tests/conf/container-rc.yaml + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.zvKeKZZN5j runtimeclass.node.k8s.io "container-rc" deleted + cat /tmp/tmp.BF6DdImeT8 + rm /tmp/tmp.zvKeKZZN5j /tmp/tmp.BF6DdImeT8 + return 0 + destroy demand-backup-sharded-16515 + local namespace=demand-backup-sharded-16515 + local ignore_logs=true + desc 'destroy cluster/operator and all other resources' + set +o xtrace ----------------------------------------------------------------------------------- destroy cluster/operator and all other resources ----------------------------------------------------------------------------------- + '[' true == false ']' + delete_crd + desc 'get and delete old CRDs and RBAC' + set +o xtrace ----------------------------------------------------------------------------------- get and delete old CRDs and RBAC ----------------------------------------------------------------------------------- + kubectl_bin delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/deploy/crd.yaml --ignore-not-found --wait=false ++ mktemp + local LAST_OUT=/tmp/tmp.uQdkirp3yM ++ mktemp + local LAST_ERR=/tmp/tmp.CWxoQokN0j + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/deploy/crd.yaml --ignore-not-found --wait=false + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.uQdkirp3yM customresourcedefinition.apiextensions.k8s.io "perconaservermongodbbackups.psmdb.percona.com" deleted customresourcedefinition.apiextensions.k8s.io "perconaservermongodbrestores.psmdb.percona.com" deleted customresourcedefinition.apiextensions.k8s.io "perconaservermongodbs.psmdb.percona.com" deleted + cat /tmp/tmp.CWxoQokN0j + rm /tmp/tmp.uQdkirp3yM /tmp/tmp.CWxoQokN0j + return 0 ++ yq eval .metadata.name /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/deploy/crd.yaml ++ grep -v '\-\-\-' + for crd_name in '$(yq eval '\''.metadata.name'\'' "${src_dir}/deploy/crd.yaml" | grep -v '\''\-\-\-'\'')' + kubectl get perconaservermongodbbackups.psmdb.percona.com --all-namespaces -o wide + grep -v NAMESPACE + xargs -L 1 sh -xc 'kubectl patch perconaservermongodbbackups.psmdb.percona.com -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' error: the server doesn't have a resource type "perconaservermongodbbackups" + kubectl patch perconaservermongodbbackups.psmdb.percona.com -n sh --type=merge -p '{"metadata":{"finalizers":[]}}' error: the server doesn't have a resource type "perconaservermongodbbackups" + : + kubectl_bin wait --for=delete crd perconaservermongodbbackups.psmdb.percona.com ++ mktemp + local LAST_OUT=/tmp/tmp.vEh4fFNfuq ++ mktemp + local LAST_ERR=/tmp/tmp.ph7eJG5dQb + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=delete crd perconaservermongodbbackups.psmdb.percona.com + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.vEh4fFNfuq + cat /tmp/tmp.ph7eJG5dQb + rm /tmp/tmp.vEh4fFNfuq /tmp/tmp.ph7eJG5dQb + return 0 + for crd_name in '$(yq eval '\''.metadata.name'\'' "${src_dir}/deploy/crd.yaml" | grep -v '\''\-\-\-'\'')' + kubectl get perconaservermongodbrestores.psmdb.percona.com --all-namespaces -o wide + grep -v NAMESPACE + xargs -L 1 sh -xc 'kubectl patch perconaservermongodbrestores.psmdb.percona.com -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' E0529 13:49:45.346476 19640 memcache.go:287] couldn't get resource list for psmdb.percona.com/v1-11-0: the server could not find the requested resource E0529 13:49:45.348523 19640 memcache.go:287] couldn't get resource list for psmdb.percona.com/v1-12-0: the server could not find the requested resource error: the server doesn't have a resource type "perconaservermongodbrestores" + kubectl patch perconaservermongodbrestores.psmdb.percona.com -n sh --type=merge -p '{"metadata":{"finalizers":[]}}' error: the server doesn't have a resource type "perconaservermongodbrestores" + : + kubectl_bin wait --for=delete crd perconaservermongodbrestores.psmdb.percona.com ++ mktemp + local LAST_OUT=/tmp/tmp.gCJMryB4dI ++ mktemp + local LAST_ERR=/tmp/tmp.kYE2rN0MOE + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=delete crd perconaservermongodbrestores.psmdb.percona.com + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.gCJMryB4dI + cat /tmp/tmp.kYE2rN0MOE + rm /tmp/tmp.gCJMryB4dI /tmp/tmp.kYE2rN0MOE + return 0 + for crd_name in '$(yq eval '\''.metadata.name'\'' "${src_dir}/deploy/crd.yaml" | grep -v '\''\-\-\-'\'')' + kubectl get perconaservermongodbs.psmdb.percona.com --all-namespaces -o wide + grep -v NAMESPACE + xargs -L 1 sh -xc 'kubectl patch perconaservermongodbs.psmdb.percona.com -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' error: the server doesn't have a resource type "perconaservermongodbs" + kubectl patch perconaservermongodbs.psmdb.percona.com -n sh --type=merge -p '{"metadata":{"finalizers":[]}}' error: the server doesn't have a resource type "perconaservermongodbs" + : + kubectl_bin wait --for=delete crd perconaservermongodbs.psmdb.percona.com ++ mktemp + local LAST_OUT=/tmp/tmp.9Lq911Ql5p ++ mktemp + local LAST_ERR=/tmp/tmp.AaBpoJEo5q + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=delete crd perconaservermongodbs.psmdb.percona.com + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.9Lq911Ql5p + cat /tmp/tmp.AaBpoJEo5q + rm /tmp/tmp.9Lq911Ql5p /tmp/tmp.AaBpoJEo5q + return 0 + local rbac_yaml=rbac.yaml + '[' -n psmdb-operator ']' + rbac_yaml=cw-rbac.yaml + kubectl_bin delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/deploy/cw-rbac.yaml --ignore-not-found ++ mktemp + local LAST_OUT=/tmp/tmp.wUCv6xbKJJ ++ mktemp + local LAST_ERR=/tmp/tmp.r6oZ1n3Las + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1561/deploy/cw-rbac.yaml --ignore-not-found + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.wUCv6xbKJJ clusterrole.rbac.authorization.k8s.io "percona-server-mongodb-operator" deleted clusterrolebinding.rbac.authorization.k8s.io "service-account-percona-server-mongodb-operator" deleted + cat /tmp/tmp.r6oZ1n3Las + rm /tmp/tmp.wUCv6xbKJJ /tmp/tmp.r6oZ1n3Las + return 0 + kubectl_bin delete -f https://github.com/cert-manager/cert-manager/releases/download/v1.14.5/cert-manager.yaml + : + '[' -n '' ']' + '[' -n psmdb-operator ']' + rm -rf /tmp/tmp.H4mtct1uIU + kubectl_bin delete --grace-period=0 --force=true namespace demand-backup-sharded-16515 + kubectl_bin delete --grace-period=0 --force=true namespace psmdb-operator ++ mktemp ++ mktemp + local LAST_OUT=/tmp/tmp.si0D8AVJJ6 ++ mktemp + local LAST_OUT=/tmp/tmp.EJDWvnGMO3 + local LAST_ERR=/tmp/tmp.IrSIs9bq7S + local exit_status=0 + local timeout=4 ++ mktemp + local LAST_ERR=/tmp/tmp.Q5bWnclTMY + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete --grace-period=0 --force=true namespace demand-backup-sharded-16515 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete --grace-period=0 --force=true namespace psmdb-operator