++ echo 'Log: /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/logs/demand-backup-sharded.log' Log: /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/logs/demand-backup-sharded.log ++ '[' -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/conf/cloud-secret.yml ']' ++ SKIP_BACKUPS_TO_AWS_GCP_AZURE= ++ oc get projects ++ kubectl get nodes ++ grep '^minikube' +++ kubectl version -o json +++ jq -r .serverVersion.gitVersion +++ grep '\-eks\-' WARNING: version difference between client (1.33) and server (1.30) exceeds the supported minor version skew of +/-1 ++ '[' ']' ++ EKS=0 +++ kubectl version -o json +++ jq -r .serverVersion.gitVersion +++ grep gke WARNING: version difference between client (1.33) and server (1.30) exceeds the supported minor version skew of +/-1 ++ '[' v1.30.12-gke.1086000 ']' ++ GKE=1 +++ kubectl version -o json +++ jq -r '.serverVersion.major + "." + .serverVersion.minor' +++ /usr/bin/sed -r 's/[^0-9.]+//g' WARNING: version difference between client (1.33) and server (1.30) exceeds the supported minor version skew of +/-1 ++ KUBE_VERSION=1.30 + set_debug + [[ 1 == 1 ]] + set -o xtrace + custom_port=27019 + create_infra demand-backup-sharded-20810 + local ns=demand-backup-sharded-20810 + [[ 1 == 1 ]] + delete_crd + desc 'get and delete old CRDs and RBAC' + set +o xtrace ----------------------------------------------------------------------------------- get and delete old CRDs and RBAC ----------------------------------------------------------------------------------- + kubectl_bin delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/deploy/crd.yaml --ignore-not-found --wait=false ++ mktemp + local LAST_OUT=/tmp/tmp.slwtVLIqkI ++ mktemp + local LAST_ERR=/tmp/tmp.HZbPWH4qgc + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/deploy/crd.yaml --ignore-not-found --wait=false + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.slwtVLIqkI customresourcedefinition.apiextensions.k8s.io "perconaservermongodbbackups.psmdb.percona.com" deleted customresourcedefinition.apiextensions.k8s.io "perconaservermongodbrestores.psmdb.percona.com" deleted customresourcedefinition.apiextensions.k8s.io "perconaservermongodbs.psmdb.percona.com" deleted + cat /tmp/tmp.HZbPWH4qgc + rm /tmp/tmp.slwtVLIqkI /tmp/tmp.HZbPWH4qgc + return 0 ++ yq eval .metadata.name /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/deploy/crd.yaml ++ grep -v '\-\-\-' + for crd_name in '$(yq eval '\''.metadata.name'\'' "${src_dir}/deploy/crd.yaml" | grep -v '\''\-\-\-'\'')' + kubectl get perconaservermongodbbackups.psmdb.percona.com --all-namespaces -o wide + grep -v NAMESPACE + xargs -L 1 sh -xc 'kubectl patch perconaservermongodbbackups.psmdb.percona.com -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' No resources found + kubectl patch perconaservermongodbbackups.psmdb.percona.com -n sh --type=merge -p '{"metadata":{"finalizers":[]}}' error: resource(s) were provided, but no name was specified + : + kubectl_bin wait --for=delete crd perconaservermongodbbackups.psmdb.percona.com ++ mktemp + local LAST_OUT=/tmp/tmp.aqW4hFeTCo ++ mktemp + local LAST_ERR=/tmp/tmp.oC61BeczrQ + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=delete crd perconaservermongodbbackups.psmdb.percona.com + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.aqW4hFeTCo customresourcedefinition.apiextensions.k8s.io/perconaservermongodbbackups.psmdb.percona.com condition met + cat /tmp/tmp.oC61BeczrQ + rm /tmp/tmp.aqW4hFeTCo /tmp/tmp.oC61BeczrQ + return 0 + for crd_name in '$(yq eval '\''.metadata.name'\'' "${src_dir}/deploy/crd.yaml" | grep -v '\''\-\-\-'\'')' + kubectl get perconaservermongodbrestores.psmdb.percona.com --all-namespaces -o wide + xargs -L 1 sh -xc 'kubectl patch perconaservermongodbrestores.psmdb.percona.com -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' + grep -v NAMESPACE error: the server doesn't have a resource type "perconaservermongodbrestores" + kubectl patch perconaservermongodbrestores.psmdb.percona.com -n sh --type=merge -p '{"metadata":{"finalizers":[]}}' error: the server doesn't have a resource type "perconaservermongodbrestores" + : + kubectl_bin wait --for=delete crd perconaservermongodbrestores.psmdb.percona.com ++ mktemp + local LAST_OUT=/tmp/tmp.dP4X4BiFNq ++ mktemp + local LAST_ERR=/tmp/tmp.LKFdNuKyAn + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=delete crd perconaservermongodbrestores.psmdb.percona.com + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.dP4X4BiFNq + cat /tmp/tmp.LKFdNuKyAn + rm /tmp/tmp.dP4X4BiFNq /tmp/tmp.LKFdNuKyAn + return 0 + for crd_name in '$(yq eval '\''.metadata.name'\'' "${src_dir}/deploy/crd.yaml" | grep -v '\''\-\-\-'\'')' + grep -v NAMESPACE + kubectl get perconaservermongodbs.psmdb.percona.com --all-namespaces -o wide + xargs -L 1 sh -xc 'kubectl patch perconaservermongodbs.psmdb.percona.com -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' error: the server doesn't have a resource type "perconaservermongodbs" + kubectl patch perconaservermongodbs.psmdb.percona.com -n sh --type=merge -p '{"metadata":{"finalizers":[]}}' error: the server doesn't have a resource type "perconaservermongodbs" + : + kubectl_bin wait --for=delete crd perconaservermongodbs.psmdb.percona.com ++ mktemp + local LAST_OUT=/tmp/tmp.TEvSlFGXqJ ++ mktemp + local LAST_ERR=/tmp/tmp.EyRAXFuSMR + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=delete crd perconaservermongodbs.psmdb.percona.com + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.TEvSlFGXqJ + cat /tmp/tmp.EyRAXFuSMR + rm /tmp/tmp.TEvSlFGXqJ /tmp/tmp.EyRAXFuSMR + return 0 + local rbac_yaml=rbac.yaml + '[' -n psmdb-operator ']' + rbac_yaml=cw-rbac.yaml + kubectl_bin delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/deploy/cw-rbac.yaml --ignore-not-found ++ mktemp + local LAST_OUT=/tmp/tmp.Ff1nBVFkge ++ mktemp + local LAST_ERR=/tmp/tmp.72PtkJfqC7 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/deploy/cw-rbac.yaml --ignore-not-found + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.Ff1nBVFkge clusterrole.rbac.authorization.k8s.io "percona-server-mongodb-operator" deleted clusterrolebinding.rbac.authorization.k8s.io "service-account-percona-server-mongodb-operator" deleted + cat /tmp/tmp.72PtkJfqC7 + rm /tmp/tmp.Ff1nBVFkge /tmp/tmp.72PtkJfqC7 + return 0 + check_crd_for_deletion PR-1912-694b2580 + local git_tag=PR-1912-694b2580 ++ curl -s https://raw.githubusercontent.com/percona/percona-server-mongodb-operator/PR-1912-694b2580/deploy/crd.yaml ++ yq eval .metadata.name ++ /usr/bin/sed ':a;N;$!ba;s/\n/ /g' ++ /usr/bin/sed s/---//g + for crd_name in '$(curl -s https://raw.githubusercontent.com/percona/percona-server-mongodb-operator/${git_tag}/deploy/crd.yaml | yq eval '\''.metadata.name'\'' | $sed '\''s/---//g'\'' | $sed '\'':a;N;$!ba;s/\n/ /g'\'')' ++ kubectl_bin get crd/null -o 'jsonpath={.status.conditions[-1].type}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.9wxNf3cnSh +++ mktemp ++ local LAST_ERR=/tmp/tmp.i94DsP0cG8 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get crd/null -o 'jsonpath={.status.conditions[-1].type}' ++ exit_status=1 ++ set -e ++ '[' 1 '!=' 0 -a -n 1 ']' ++ cat /tmp/tmp.9wxNf3cnSh ++ cat /tmp/tmp.i94DsP0cG8 Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "null" not found ++ sleep 0 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get crd/null -o 'jsonpath={.status.conditions[-1].type}' ++ exit_status=1 ++ set -e ++ '[' 1 '!=' 0 -a -n 1 ']' ++ cat /tmp/tmp.9wxNf3cnSh ++ cat /tmp/tmp.i94DsP0cG8 Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "null" not found ++ sleep 4 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get crd/null -o 'jsonpath={.status.conditions[-1].type}' ++ exit_status=1 ++ set -e ++ '[' 1 '!=' 0 -a -n 1 ']' ++ cat /tmp/tmp.9wxNf3cnSh ++ cat /tmp/tmp.i94DsP0cG8 Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "null" not found ++ sleep 8 ++ cat /tmp/tmp.9wxNf3cnSh ++ cat /tmp/tmp.i94DsP0cG8 Error from server (NotFound): customresourcedefinitions.apiextensions.k8s.io "null" not found ++ rm /tmp/tmp.9wxNf3cnSh /tmp/tmp.i94DsP0cG8 ++ return 1 + [[ '' == \T\e\r\m\i\n\a\t\i\n\g ]] + '[' -n psmdb-operator ']' + create_namespace psmdb-operator + local namespace=psmdb-operator + local skip_clean_namespace= + [[ 1 == 1 ]] + [[ -z '' ]] + destroy_chaos_mesh ++ helm list --all-namespaces --filter chaos-mesh ++ awk '-F ' '{print $2}' ++ tail -n1 ++ sed s/NAMESPACE// + local chaos_mesh_ns= + desc 'destroy chaos-mesh' + set +o xtrace ----------------------------------------------------------------------------------- destroy chaos-mesh ----------------------------------------------------------------------------------- + '[' -n '' ']' ++ kubectl get MutatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete MutatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep validate-auth ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl api-resources ++ grep chaos-mesh ++ awk '{print $1}' ++ kubectl get crd ++ grep chaos-mesh.org ++ awk '{print $1}' + timeout 30 kubectl delete crd error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrolebinding ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrolebinding error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrole ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrole error: resource(s) were provided, but no name was specified + : + desc 'cleaned up all old namespaces' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up all old namespaces ----------------------------------------------------------------------------------- + egrep -v '^kube-|^default|Terminating|psmdb-operator|openshift|gke-mcs|^NAME' + '[' -n '' ']' + desc 'cleaned up old namespaces psmdb-operator' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up old namespaces psmdb-operator ----------------------------------------------------------------------------------- + kubectl_bin delete namespace psmdb-operator --ignore-not-found ++ mktemp + local LAST_OUT=/tmp/tmp.uADAvPeyz7 + kubectl_bin get ns ++ mktemp ++ mktemp + local LAST_ERR=/tmp/tmp.PUiJczZmfA + local exit_status=0 + local timeout=4 + local LAST_OUT=/tmp/tmp.32WeXG4X0p ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete namespace psmdb-operator --ignore-not-found ++ mktemp + local LAST_ERR=/tmp/tmp.UCUtc0n66q + local exit_status=0 + local timeout=4 + awk '{print$1}' + xargs kubectl delete ns ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get ns + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.32WeXG4X0p + cat /tmp/tmp.UCUtc0n66q + rm /tmp/tmp.32WeXG4X0p /tmp/tmp.UCUtc0n66q + return 0 namespace "demand-backup-sharded-18898" deleted namespace "gke-managed-cim" deleted namespace "gke-managed-system" deleted namespace "gmp-public" deleted namespace "gmp-system" deleted + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.uADAvPeyz7 namespace "psmdb-operator" deleted + cat /tmp/tmp.PUiJczZmfA + rm /tmp/tmp.uADAvPeyz7 /tmp/tmp.PUiJczZmfA + return 0 + kubectl_bin wait --for=delete namespace psmdb-operator ++ mktemp + local LAST_OUT=/tmp/tmp.yGHIxYdwnc ++ mktemp + local LAST_ERR=/tmp/tmp.iI4vm67eQ8 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=delete namespace psmdb-operator + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.yGHIxYdwnc + cat /tmp/tmp.iI4vm67eQ8 + rm /tmp/tmp.yGHIxYdwnc /tmp/tmp.iI4vm67eQ8 + return 0 + desc 'create namespace psmdb-operator' + set +o xtrace ----------------------------------------------------------------------------------- create namespace psmdb-operator ----------------------------------------------------------------------------------- + kubectl_bin create namespace psmdb-operator ++ mktemp + local LAST_OUT=/tmp/tmp.ZqZao3OUeW ++ mktemp + local LAST_ERR=/tmp/tmp.UVq52PLiNW + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl create namespace psmdb-operator + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.ZqZao3OUeW namespace/psmdb-operator created + cat /tmp/tmp.UVq52PLiNW + rm /tmp/tmp.ZqZao3OUeW /tmp/tmp.UVq52PLiNW + return 0 ++ kubectl_bin config current-context +++ mktemp ++ local LAST_OUT=/tmp/tmp.jNsQmLONXl +++ mktemp ++ local LAST_ERR=/tmp/tmp.fJgHcgC6ZG ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl config current-context ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.jNsQmLONXl ++ cat /tmp/tmp.fJgHcgC6ZG ++ rm /tmp/tmp.jNsQmLONXl /tmp/tmp.fJgHcgC6ZG ++ return 0 + kubectl_bin config set-context gke_cloud-dev-112233_us-central1-a_jen-psmdb-1912-694b2580-9-cluster5 --namespace=psmdb-operator ++ mktemp + local LAST_OUT=/tmp/tmp.lq1UXfG61d ++ mktemp + local LAST_ERR=/tmp/tmp.HO8zYfoGJC + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl config set-context gke_cloud-dev-112233_us-central1-a_jen-psmdb-1912-694b2580-9-cluster5 --namespace=psmdb-operator + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.lq1UXfG61d Context "gke_cloud-dev-112233_us-central1-a_jen-psmdb-1912-694b2580-9-cluster5" modified. + cat /tmp/tmp.HO8zYfoGJC + rm /tmp/tmp.lq1UXfG61d /tmp/tmp.HO8zYfoGJC + return 0 + deploy_operator + desc 'start PSMDB operator' + set +o xtrace ----------------------------------------------------------------------------------- start PSMDB operator ----------------------------------------------------------------------------------- + local cr_file + '[' -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/conf/crd.yaml ']' + cr_file=/mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/deploy/crd.yaml + kubectl_bin apply --server-side --force-conflicts -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/deploy/crd.yaml ++ mktemp + local LAST_OUT=/tmp/tmp.X7NyieEopa ++ mktemp + local LAST_ERR=/tmp/tmp.N6Y0gHhRD1 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply --server-side --force-conflicts -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/deploy/crd.yaml + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.X7NyieEopa customresourcedefinition.apiextensions.k8s.io/perconaservermongodbbackups.psmdb.percona.com serverside-applied customresourcedefinition.apiextensions.k8s.io/perconaservermongodbrestores.psmdb.percona.com serverside-applied customresourcedefinition.apiextensions.k8s.io/perconaservermongodbs.psmdb.percona.com serverside-applied + cat /tmp/tmp.N6Y0gHhRD1 + rm /tmp/tmp.X7NyieEopa /tmp/tmp.N6Y0gHhRD1 + return 0 + '[' -n psmdb-operator ']' + apply_rbac cw-rbac + local operator_namespace=psmdb-operator + local rbac=cw-rbac + sed -e 's^namespace: .*^namespace: psmdb-operator^' + kubectl_bin apply -n psmdb-operator -f - ++ mktemp + cat /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/deploy/cw-rbac.yaml + local LAST_OUT=/tmp/tmp.pCfofrXUcV ++ mktemp + local LAST_ERR=/tmp/tmp.7USHUrAncl + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -n psmdb-operator -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.pCfofrXUcV clusterrole.rbac.authorization.k8s.io/percona-server-mongodb-operator created serviceaccount/percona-server-mongodb-operator created clusterrolebinding.rbac.authorization.k8s.io/service-account-percona-server-mongodb-operator created + cat /tmp/tmp.7USHUrAncl + rm /tmp/tmp.pCfofrXUcV /tmp/tmp.7USHUrAncl + return 0 + yq eval ' (.spec.template.spec.containers[].image = "perconalab/percona-server-mongodb-operator:PR-1912-694b2580") | ((.. | select(.[] == "DISABLE_TELEMETRY")) |= .value="true") | ((.. | select(.[] == "LOG_LEVEL")) |= .value="DEBUG")' /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/deploy/cw-operator.yaml + kubectl_bin apply -f - ++ mktemp + local LAST_OUT=/tmp/tmp.3tCJ3PXmGF ++ mktemp + local LAST_ERR=/tmp/tmp.yHXGyvXeF6 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.3tCJ3PXmGF deployment.apps/percona-server-mongodb-operator created + cat /tmp/tmp.yHXGyvXeF6 + rm /tmp/tmp.3tCJ3PXmGF /tmp/tmp.yHXGyvXeF6 + return 0 + sleep 2 ++ get_operator_pod ++ kubectl_bin get pods --selector=name=percona-server-mongodb-operator -o 'jsonpath={.items[].metadata.name}' -n psmdb-operator +++ mktemp ++ local LAST_OUT=/tmp/tmp.YCBCVfbENE +++ mktemp ++ local LAST_ERR=/tmp/tmp.R8hhZN7zHS ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=percona-server-mongodb-operator -o 'jsonpath={.items[].metadata.name}' -n psmdb-operator ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.YCBCVfbENE ++ cat /tmp/tmp.R8hhZN7zHS ++ rm /tmp/tmp.YCBCVfbENE /tmp/tmp.R8hhZN7zHS ++ return 0 + wait_pod percona-server-mongodb-operator-599774bb4f-flsgc + local pod=percona-server-mongodb-operator-599774bb4f-flsgc + set +o xtrace waiting for pod/percona-server-mongodb-operator-599774bb4f-flsgc to be ready.OK + echo 'Print operator info from log' Print operator info from log + grep 'Manager starting up' ++ get_operator_pod ++ kubectl_bin get pods --selector=name=percona-server-mongodb-operator -o 'jsonpath={.items[].metadata.name}' -n psmdb-operator +++ mktemp ++ local LAST_OUT=/tmp/tmp.MnMFMHvRSj +++ mktemp ++ local LAST_ERR=/tmp/tmp.ymiBSomY4s ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=percona-server-mongodb-operator -o 'jsonpath={.items[].metadata.name}' -n psmdb-operator ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.MnMFMHvRSj ++ cat /tmp/tmp.ymiBSomY4s ++ rm /tmp/tmp.MnMFMHvRSj /tmp/tmp.ymiBSomY4s ++ return 0 + kubectl_bin logs percona-server-mongodb-operator-599774bb4f-flsgc ++ mktemp + local LAST_OUT=/tmp/tmp.6Xuga4wDL1 ++ mktemp + local LAST_ERR=/tmp/tmp.Iy47Qg6IBj + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl logs percona-server-mongodb-operator-599774bb4f-flsgc + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.6Xuga4wDL1 + cat /tmp/tmp.Iy47Qg6IBj + rm /tmp/tmp.6Xuga4wDL1 /tmp/tmp.Iy47Qg6IBj + return 0 2025-05-22T12:29:48.593Z INFO setup Manager starting up {"gitCommit": "694b258049b29a2acece1d4119a4c1718973935d", "gitBranch": "PR-1912-694b2580", "buildTime": "", "goVersion": "go1.24.3", "os": "linux", "arch": "amd64"} + create_namespace demand-backup-sharded-20810 + local namespace=demand-backup-sharded-20810 + local skip_clean_namespace= + [[ 1 == 1 ]] + [[ -z '' ]] + destroy_chaos_mesh ++ helm list --all-namespaces --filter chaos-mesh ++ tail -n1 ++ awk '-F ' '{print $2}' ++ sed s/NAMESPACE// + local chaos_mesh_ns= + desc 'destroy chaos-mesh' + set +o xtrace ----------------------------------------------------------------------------------- destroy chaos-mesh ----------------------------------------------------------------------------------- + '[' -n '' ']' ++ kubectl get MutatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete MutatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl get ValidatingWebhookConfiguration ++ grep validate-auth ++ awk '{print $1}' + timeout 30 kubectl delete ValidatingWebhookConfiguration error: resource(s) were provided, but no name was specified + : ++ kubectl api-resources ++ grep chaos-mesh ++ awk '{print $1}' ++ kubectl get crd ++ grep chaos-mesh.org ++ awk '{print $1}' + timeout 30 kubectl delete crd error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrolebinding ++ grep chaos-mesh ++ awk '{print $1}' + timeout 30 kubectl delete clusterrolebinding error: resource(s) were provided, but no name was specified + : ++ kubectl get clusterrole ++ awk '{print $1}' ++ grep chaos-mesh + timeout 30 kubectl delete clusterrole error: resource(s) were provided, but no name was specified + : + desc 'cleaned up all old namespaces' + set +o xtrace ----------------------------------------------------------------------------------- cleaned up all old namespaces ----------------------------------------------------------------------------------- + kubectl_bin get ns + awk '{print$1}' + '[' -n '' ']' + desc 'cleaned up old namespaces demand-backup-sharded-20810' + set +o xtrace + egrep -v '^kube-|^default|Terminating|psmdb-operator|openshift|gke-mcs|^NAME' ----------------------------------------------------------------------------------- cleaned up old namespaces demand-backup-sharded-20810 ----------------------------------------------------------------------------------- + kubectl_bin delete namespace demand-backup-sharded-20810 --ignore-not-found ++ mktemp ++ mktemp + xargs kubectl delete ns + local LAST_OUT=/tmp/tmp.NH4Irzblzw ++ mktemp + local LAST_ERR=/tmp/tmp.qQ9gMHFGqV + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete namespace demand-backup-sharded-20810 --ignore-not-found + local LAST_OUT=/tmp/tmp.fUeHBwUpKP ++ mktemp + local LAST_ERR=/tmp/tmp.b16DqzK0hu + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get ns + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.fUeHBwUpKP + cat /tmp/tmp.b16DqzK0hu + rm /tmp/tmp.fUeHBwUpKP /tmp/tmp.b16DqzK0hu + return 0 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.NH4Irzblzw + cat /tmp/tmp.qQ9gMHFGqV + rm /tmp/tmp.NH4Irzblzw /tmp/tmp.qQ9gMHFGqV + return 0 + kubectl_bin wait --for=delete namespace demand-backup-sharded-20810 ++ mktemp + local LAST_OUT=/tmp/tmp.zIGf6ji0z6 ++ mktemp + local LAST_ERR=/tmp/tmp.8nHWJvFtTc + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=delete namespace demand-backup-sharded-20810 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.zIGf6ji0z6 + cat /tmp/tmp.8nHWJvFtTc + rm /tmp/tmp.zIGf6ji0z6 /tmp/tmp.8nHWJvFtTc + return 0 + desc 'create namespace demand-backup-sharded-20810' + set +o xtrace ----------------------------------------------------------------------------------- create namespace demand-backup-sharded-20810 ----------------------------------------------------------------------------------- + kubectl_bin create namespace demand-backup-sharded-20810 ++ mktemp + local LAST_OUT=/tmp/tmp.K5nVXcK7Rx ++ mktemp + local LAST_ERR=/tmp/tmp.9sdmXOgGKN + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl create namespace demand-backup-sharded-20810 namespace "gke-managed-cim" deleted namespace "gke-managed-system" deleted namespace "gmp-public" deleted namespace "gmp-system" deleted + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.K5nVXcK7Rx namespace/demand-backup-sharded-20810 created + cat /tmp/tmp.9sdmXOgGKN + rm /tmp/tmp.K5nVXcK7Rx /tmp/tmp.9sdmXOgGKN + return 0 ++ kubectl_bin config current-context +++ mktemp ++ local LAST_OUT=/tmp/tmp.HHIjtwIyZd +++ mktemp ++ local LAST_ERR=/tmp/tmp.PdGpedk8do ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl config current-context ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.HHIjtwIyZd ++ cat /tmp/tmp.PdGpedk8do ++ rm /tmp/tmp.HHIjtwIyZd /tmp/tmp.PdGpedk8do ++ return 0 + kubectl_bin config set-context gke_cloud-dev-112233_us-central1-a_jen-psmdb-1912-694b2580-9-cluster5 --namespace=demand-backup-sharded-20810 ++ mktemp + local LAST_OUT=/tmp/tmp.k5697rrN1z ++ mktemp + local LAST_ERR=/tmp/tmp.pEzr7UIB0k + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl config set-context gke_cloud-dev-112233_us-central1-a_jen-psmdb-1912-694b2580-9-cluster5 --namespace=demand-backup-sharded-20810 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.k5697rrN1z Context "gke_cloud-dev-112233_us-central1-a_jen-psmdb-1912-694b2580-9-cluster5" modified. + cat /tmp/tmp.pEzr7UIB0k + rm /tmp/tmp.k5697rrN1z /tmp/tmp.pEzr7UIB0k + return 0 + deploy_minio + desc 'install Minio' + set +o xtrace ----------------------------------------------------------------------------------- install Minio ----------------------------------------------------------------------------------- + helm uninstall minio-service Error: uninstall: Release not loaded: minio-service: release: not found + : + helm repo remove minio "minio" has been removed from your repositories + helm repo add minio https://charts.min.io/ "minio" has been added to your repositories + retry 10 60 helm install minio-service --version 5.4.0 --set replicas=1 --set mode=standalone --set resources.requests.memory=256Mi --set rootUser=rootuser --set rootPassword=rootpass123 --set 'users[0].accessKey=some-access-key' --set 'users[0].secretKey=some-secret-key' --set 'users[0].policy=consoleAdmin' --set service.type=ClusterIP --set configPathmc=/tmp/.minio/ --set persistence.size=2G --set securityContext.enabled=false minio/minio + local max=10 + local delay=60 + shift 2 + local n=1 + helm install minio-service --version 5.4.0 --set replicas=1 --set mode=standalone --set resources.requests.memory=256Mi --set rootUser=rootuser --set rootPassword=rootpass123 --set 'users[0].accessKey=some-access-key' --set 'users[0].secretKey=some-secret-key' --set 'users[0].policy=consoleAdmin' --set service.type=ClusterIP --set configPathmc=/tmp/.minio/ --set persistence.size=2G --set securityContext.enabled=false minio/minio NAME: minio-service LAST DEPLOYED: Thu May 22 12:30:07 2025 NAMESPACE: demand-backup-sharded-20810 STATUS: deployed REVISION: 1 TEST SUITE: None NOTES: MinIO can be accessed via port 9000 on the following DNS name from within your cluster: minio-service.demand-backup-sharded-20810.cluster.local To access MinIO from localhost, run the below commands: 1. export POD_NAME=$(kubectl get pods --namespace demand-backup-sharded-20810 -l "release=minio-service" -o jsonpath="{.items[0].metadata.name}") 2. kubectl port-forward $POD_NAME 9000 --namespace demand-backup-sharded-20810 Read more about port forwarding here: http://kubernetes.io/docs/user-guide/kubectl/kubectl_port-forward/ You can now access MinIO server on http://localhost:9000. Follow the below steps to connect to MinIO server with mc client: 1. Download the MinIO mc client - https://min.io/docs/minio/linux/reference/minio-mc.html#quickstart 2. export MC_HOST_minio-service-local=http://$(kubectl get secret --namespace demand-backup-sharded-20810 minio-service -o jsonpath="{.data.rootUser}" | base64 --decode):$(kubectl get secret --namespace demand-backup-sharded-20810 minio-service -o jsonpath="{.data.rootPassword}" | base64 --decode)@localhost:9000 3. mc ls minio-service-local ++ kubectl_bin get pods --selector=release=minio-service -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.OHk4e22vg3 +++ mktemp ++ local LAST_ERR=/tmp/tmp.MHI4rbRdXS ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=release=minio-service -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.OHk4e22vg3 ++ cat /tmp/tmp.MHI4rbRdXS ++ rm /tmp/tmp.OHk4e22vg3 /tmp/tmp.MHI4rbRdXS ++ return 0 + MINIO_POD=minio-service-86dfccd949-sxmvh + wait_pod minio-service-86dfccd949-sxmvh + local pod=minio-service-86dfccd949-sxmvh + set +o xtrace waiting for pod/minio-service-86dfccd949-sxmvh to be ready.OK + '[' -n psmdb-operator ']' + kubectl_bin create svc -n psmdb-operator externalname minio-service --external-name=minio-service.demand-backup-sharded-20810.svc.cluster.local --tcp=9000 ++ mktemp + local LAST_OUT=/tmp/tmp.hSPPsGkFvo ++ mktemp + local LAST_ERR=/tmp/tmp.AaF0S1jdRo + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl create svc -n psmdb-operator externalname minio-service --external-name=minio-service.demand-backup-sharded-20810.svc.cluster.local --tcp=9000 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.hSPPsGkFvo service/minio-service created + cat /tmp/tmp.AaF0S1jdRo + rm /tmp/tmp.hSPPsGkFvo /tmp/tmp.AaF0S1jdRo + return 0 + create_minio_bucket operator-testing + local bucket=operator-testing + kubectl_bin run -i --rm aws-cli --image=perconalab/awscli --restart=Never -- bash -c 'AWS_ACCESS_KEY_ID=some-access-key AWS_SECRET_ACCESS_KEY=some-secret-key AWS_DEFAULT_REGION=us-east-1 /usr/bin/aws --endpoint-url http://minio-service:9000 s3 mb s3://operator-testing' ++ mktemp + local LAST_OUT=/tmp/tmp.6BDwYRQTHX ++ mktemp + local LAST_ERR=/tmp/tmp.1i29BRpXG3 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl run -i --rm aws-cli --image=perconalab/awscli --restart=Never -- bash -c 'AWS_ACCESS_KEY_ID=some-access-key AWS_SECRET_ACCESS_KEY=some-secret-key AWS_DEFAULT_REGION=us-east-1 /usr/bin/aws --endpoint-url http://minio-service:9000 s3 mb s3://operator-testing' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.6BDwYRQTHX make_bucket: operator-testing pod "aws-cli" deleted + cat /tmp/tmp.1i29BRpXG3 + rm /tmp/tmp.6BDwYRQTHX /tmp/tmp.1i29BRpXG3 + return 0 + desc 'create first PSMDB cluster with custom port 27019' + set +o xtrace ----------------------------------------------------------------------------------- create first PSMDB cluster with custom port 27019 ----------------------------------------------------------------------------------- + cluster=some-name + kubectl_bin apply -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/conf/secrets.yml -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/conf/client.yml ++ mktemp + local LAST_OUT=/tmp/tmp.jiDy900jWH ++ mktemp + local LAST_ERR=/tmp/tmp.B4QFwMris7 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/conf/secrets.yml -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/conf/client.yml + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.jiDy900jWH secret/some-users created deployment.apps/psmdb-client created + cat /tmp/tmp.B4QFwMris7 + rm /tmp/tmp.jiDy900jWH /tmp/tmp.B4QFwMris7 + return 0 + apply_s3_storage_secrets + desc 'create secrets for cloud storages' + set +o xtrace ----------------------------------------------------------------------------------- create secrets for cloud storages ----------------------------------------------------------------------------------- + '[' -z '' ']' + kubectl_bin apply -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/conf/minio-secret.yml -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/conf/cloud-secret.yml ++ mktemp + local LAST_OUT=/tmp/tmp.NKjhnrKBO4 ++ mktemp + local LAST_ERR=/tmp/tmp.WNE32GvkVI + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/conf/minio-secret.yml -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/conf/cloud-secret.yml + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.NKjhnrKBO4 secret/minio-secret created secret/aws-s3-secret created secret/gcp-cs-secret created secret/azure-secret created + cat /tmp/tmp.WNE32GvkVI + rm /tmp/tmp.NKjhnrKBO4 /tmp/tmp.WNE32GvkVI + return 0 + version_gt 1.19 ++ echo '1.30 >= 1.19' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + '[' 0 -ne 1 ']' + cat /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/conf/container-rc.yaml + /usr/bin/sed s/docker/runc/g + kubectl_bin apply -f - ++ mktemp + local LAST_OUT=/tmp/tmp.9vuZsecmEw ++ mktemp + local LAST_ERR=/tmp/tmp.qvfDF0Mlh4 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.9vuZsecmEw runtimeclass.node.k8s.io/container-rc unchanged + cat /tmp/tmp.qvfDF0Mlh4 + rm /tmp/tmp.9vuZsecmEw /tmp/tmp.qvfDF0Mlh4 + return 0 + apply_cluster /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/conf/some-name-rs0.yml + '[' -z '' ']' + cat_config /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/conf/some-name-rs0.yml + kubectl_bin apply -f - + cat /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/conf/some-name-rs0.yml + yq eval '(.spec | select(.image == null)).image = "perconalab/percona-server-mongodb-operator:main-mongod7.0"' ++ mktemp + yq eval '(.spec | select(has("initImage"))).initImage = "perconalab/percona-server-mongodb-operator:PR-1912-694b2580"' + yq eval '(.spec | select(has("backup"))).backup.image = "perconalab/percona-server-mongodb-operator:main-backup"' + yq eval '.spec.upgradeOptions.apply="Never"' + local LAST_OUT=/tmp/tmp.tgj7IMOrRo + yq eval '(.spec | select(has("pmm"))).pmm.image = "perconalab/pmm-client:dev-latest"' ++ mktemp + local LAST_ERR=/tmp/tmp.Z8Btm2TUeu + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.tgj7IMOrRo perconaservermongodb.psmdb.percona.com/some-name created + cat /tmp/tmp.Z8Btm2TUeu + rm /tmp/tmp.tgj7IMOrRo /tmp/tmp.Z8Btm2TUeu + return 0 + desc 'check if all 3 Pods started' + set +o xtrace ----------------------------------------------------------------------------------- check if all 3 Pods started ----------------------------------------------------------------------------------- + wait_for_running some-name-rs0 3 + local name=some-name-rs0 + let last_pod=2 + local check_cluster_readyness=true + set_debug + [[ 1 == 1 ]] + set -o xtrace + local rs_name=rs0 + local cluster_name=some-name ++ seq 0 2 + for i in '$(seq 0 $last_pod)' + [[ 0 -eq 2 ]] + wait_pod some-name-rs0-0 + local pod=some-name-rs0-0 + set +o xtrace waiting for pod/some-name-rs0-0 to be ready......OK + for i in '$(seq 0 $last_pod)' + [[ 1 -eq 2 ]] + wait_pod some-name-rs0-1 + local pod=some-name-rs0-1 + set +o xtrace waiting for pod/some-name-rs0-1 to be ready.....OK + for i in '$(seq 0 $last_pod)' + [[ 2 -eq 2 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="rs0")].arbiter.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.HJQh2IKcuN +++ mktemp ++ local LAST_ERR=/tmp/tmp.vdBkJ3nWJf ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="rs0")].arbiter.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.HJQh2IKcuN ++ cat /tmp/tmp.vdBkJ3nWJf ++ rm /tmp/tmp.HJQh2IKcuN /tmp/tmp.vdBkJ3nWJf ++ return 0 + [[ '' == \t\r\u\e ]] + wait_pod some-name-rs0-2 + local pod=some-name-rs0-2 + set +o xtrace waiting for pod/some-name-rs0-2 to be ready.......OK ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="rs0")].non_voting.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.mHGpt6Uas4 +++ mktemp ++ local LAST_ERR=/tmp/tmp.dty9ENka3W ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="rs0")].non_voting.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.mHGpt6Uas4 ++ cat /tmp/tmp.dty9ENka3W ++ rm /tmp/tmp.mHGpt6Uas4 /tmp/tmp.dty9ENka3W ++ return 0 + [[ '' == \t\r\u\e ]] + sleep 10 + [[ true == \t\r\u\e ]] + set +x Waiting for cluster readyness............................................ + wait_for_running some-name-cfg 3 false + local name=some-name-cfg + let last_pod=2 + local check_cluster_readyness=false + set_debug + [[ 1 == 1 ]] + set -o xtrace + local rs_name=cfg + local cluster_name=some-name ++ seq 0 2 + for i in '$(seq 0 $last_pod)' + [[ 0 -eq 2 ]] + wait_pod some-name-cfg-0 + local pod=some-name-cfg-0 + set +o xtrace waiting for pod/some-name-cfg-0 to be ready.OK + for i in '$(seq 0 $last_pod)' + [[ 1 -eq 2 ]] + wait_pod some-name-cfg-1 + local pod=some-name-cfg-1 + set +o xtrace waiting for pod/some-name-cfg-1 to be ready.OK + for i in '$(seq 0 $last_pod)' + [[ 2 -eq 2 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="cfg")].arbiter.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.4ESyT5eC65 +++ mktemp ++ local LAST_ERR=/tmp/tmp.wHjdygQzLV ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="cfg")].arbiter.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.4ESyT5eC65 ++ cat /tmp/tmp.wHjdygQzLV ++ rm /tmp/tmp.4ESyT5eC65 /tmp/tmp.wHjdygQzLV ++ return 0 + [[ '' == \t\r\u\e ]] + wait_pod some-name-cfg-2 + local pod=some-name-cfg-2 + set +o xtrace waiting for pod/some-name-cfg-2 to be ready.OK ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="cfg")].non_voting.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.uVjI3y83K8 +++ mktemp ++ local LAST_ERR=/tmp/tmp.CB44tQxzKf ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="cfg")].non_voting.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.uVjI3y83K8 ++ cat /tmp/tmp.CB44tQxzKf ++ rm /tmp/tmp.uVjI3y83K8 /tmp/tmp.CB44tQxzKf ++ return 0 + [[ '' == \t\r\u\e ]] + sleep 10 + [[ false == \t\r\u\e ]] + wait_for_running some-name-mongos 3 + local name=some-name-mongos + let last_pod=2 + local check_cluster_readyness=true + set_debug + [[ 1 == 1 ]] + set -o xtrace + local rs_name=mongos + local cluster_name=some-name ++ seq 0 2 + for i in '$(seq 0 $last_pod)' + [[ 0 -eq 2 ]] + wait_pod some-name-mongos-0 + local pod=some-name-mongos-0 + set +o xtrace waiting for pod/some-name-mongos-0 to be ready.OK + for i in '$(seq 0 $last_pod)' + [[ 1 -eq 2 ]] + wait_pod some-name-mongos-1 + local pod=some-name-mongos-1 + set +o xtrace waiting for pod/some-name-mongos-1 to be ready.OK + for i in '$(seq 0 $last_pod)' + [[ 2 -eq 2 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="mongos")].arbiter.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.gMELeT6tWE +++ mktemp ++ local LAST_ERR=/tmp/tmp.CkaJS9qf9Z ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="mongos")].arbiter.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.gMELeT6tWE ++ cat /tmp/tmp.CkaJS9qf9Z ++ rm /tmp/tmp.gMELeT6tWE /tmp/tmp.CkaJS9qf9Z ++ return 0 + [[ '' == \t\r\u\e ]] + wait_pod some-name-mongos-2 + local pod=some-name-mongos-2 + set +o xtrace waiting for pod/some-name-mongos-2 to be ready.OK ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="mongos")].non_voting.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Nq7cC6qake +++ mktemp ++ local LAST_ERR=/tmp/tmp.Zkt1bOfA4r ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="mongos")].non_voting.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.Nq7cC6qake ++ cat /tmp/tmp.Zkt1bOfA4r ++ rm /tmp/tmp.Nq7cC6qake /tmp/tmp.Zkt1bOfA4r ++ return 0 + [[ '' == \t\r\u\e ]] + sleep 10 + [[ true == \t\r\u\e ]] + set +x Waiting for cluster readyness + sleep 10 + desc 'check if service and statefulset created with expected config' + set +o xtrace ----------------------------------------------------------------------------------- check if service and statefulset created with expected config ----------------------------------------------------------------------------------- + compare_kubectl statefulset/some-name-rs0 + local resource=statefulset/some-name-rs0 + local postfix= + local skip_generation_check= + local expected_result=/mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-rs0.yml + local new_result=/tmp/tmp.f8pe3qNJC3/statefulset_some-name-rs0.yml + '[' -n '' -a -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-rs0-oc.yml ']' + yq eval ' del(.metadata.ownerReferences[].apiVersion) | del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "NAMESPACE")) | del(.metadata.selfLink) | del(.metadata.annotations."cloud.google.com/neg") | del(.metadata.annotations."kubectl.kubernetes.io/last-applied-configuration") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.status) | (.. | select(tag == "!!str")) |= sub("demand-backup-sharded-20810", "NAME_SPACE") | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "extensions/v1beta1")) = "apps/v1" | (.. | select(. == "batch/v1beta1")) = "batch/v1" ' - + kubectl_bin get -o yaml statefulset/some-name-rs0 ++ mktemp + local LAST_OUT=/tmp/tmp.lqCEkbgSva ++ mktemp + local LAST_ERR=/tmp/tmp.AUPJAEwfMv + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml statefulset/some-name-rs0 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.lqCEkbgSva + cat /tmp/tmp.AUPJAEwfMv + rm /tmp/tmp.lqCEkbgSva /tmp/tmp.AUPJAEwfMv + return 0 + yq -i eval 'del(.spec.persistentVolumeClaimRetentionPolicy)' /tmp/tmp.f8pe3qNJC3/statefulset_some-name-rs0.yml + version_gt 1.22 ++ echo '1.30 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + yq -i eval 'del(.spec.internalTrafficPolicy)' /tmp/tmp.f8pe3qNJC3/statefulset_some-name-rs0.yml + yq -i eval 'del(.spec.allocateLoadBalancerNodePorts)' /tmp/tmp.f8pe3qNJC3/statefulset_some-name-rs0.yml + [[ /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-rs0.yml == */cronjob* ]] + '[' -n '' ']' + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-rs0.yml /tmp/tmp.f8pe3qNJC3/statefulset_some-name-rs0.yml + compare_kubectl statefulset/some-name-rs1 + local resource=statefulset/some-name-rs1 + local postfix= + local skip_generation_check= + local expected_result=/mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-rs1.yml + local new_result=/tmp/tmp.f8pe3qNJC3/statefulset_some-name-rs1.yml + '[' -n '' -a -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-rs1-oc.yml ']' + kubectl_bin get -o yaml statefulset/some-name-rs1 + yq eval ' del(.metadata.ownerReferences[].apiVersion) | del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "NAMESPACE")) | del(.metadata.selfLink) | del(.metadata.annotations."cloud.google.com/neg") | del(.metadata.annotations."kubectl.kubernetes.io/last-applied-configuration") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.status) | (.. | select(tag == "!!str")) |= sub("demand-backup-sharded-20810", "NAME_SPACE") | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "extensions/v1beta1")) = "apps/v1" | (.. | select(. == "batch/v1beta1")) = "batch/v1" ' - ++ mktemp + local LAST_OUT=/tmp/tmp.YuhKY9D3oe ++ mktemp + local LAST_ERR=/tmp/tmp.qmdxCOh599 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml statefulset/some-name-rs1 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.YuhKY9D3oe + cat /tmp/tmp.qmdxCOh599 + rm /tmp/tmp.YuhKY9D3oe /tmp/tmp.qmdxCOh599 + return 0 + yq -i eval 'del(.spec.persistentVolumeClaimRetentionPolicy)' /tmp/tmp.f8pe3qNJC3/statefulset_some-name-rs1.yml + version_gt 1.22 ++ echo '1.30 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + yq -i eval 'del(.spec.internalTrafficPolicy)' /tmp/tmp.f8pe3qNJC3/statefulset_some-name-rs1.yml + yq -i eval 'del(.spec.allocateLoadBalancerNodePorts)' /tmp/tmp.f8pe3qNJC3/statefulset_some-name-rs1.yml + [[ /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-rs1.yml == */cronjob* ]] + '[' -n '' ']' + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-rs1.yml /tmp/tmp.f8pe3qNJC3/statefulset_some-name-rs1.yml + compare_kubectl statefulset/some-name-rs2 + local resource=statefulset/some-name-rs2 + local postfix= + local skip_generation_check= + local expected_result=/mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-rs2.yml + local new_result=/tmp/tmp.f8pe3qNJC3/statefulset_some-name-rs2.yml + '[' -n '' -a -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-rs2-oc.yml ']' + kubectl_bin get -o yaml statefulset/some-name-rs2 ++ mktemp + yq eval ' del(.metadata.ownerReferences[].apiVersion) | del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "NAMESPACE")) | del(.metadata.selfLink) | del(.metadata.annotations."cloud.google.com/neg") | del(.metadata.annotations."kubectl.kubernetes.io/last-applied-configuration") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.status) | (.. | select(tag == "!!str")) |= sub("demand-backup-sharded-20810", "NAME_SPACE") | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "extensions/v1beta1")) = "apps/v1" | (.. | select(. == "batch/v1beta1")) = "batch/v1" ' - + local LAST_OUT=/tmp/tmp.3TG3VCu0QB ++ mktemp + local LAST_ERR=/tmp/tmp.Ye8fGKxDMM + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml statefulset/some-name-rs2 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.3TG3VCu0QB + cat /tmp/tmp.Ye8fGKxDMM + rm /tmp/tmp.3TG3VCu0QB /tmp/tmp.Ye8fGKxDMM + return 0 + yq -i eval 'del(.spec.persistentVolumeClaimRetentionPolicy)' /tmp/tmp.f8pe3qNJC3/statefulset_some-name-rs2.yml + version_gt 1.22 ++ echo '1.30 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + yq -i eval 'del(.spec.internalTrafficPolicy)' /tmp/tmp.f8pe3qNJC3/statefulset_some-name-rs2.yml + yq -i eval 'del(.spec.allocateLoadBalancerNodePorts)' /tmp/tmp.f8pe3qNJC3/statefulset_some-name-rs2.yml + [[ /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-rs2.yml == */cronjob* ]] + '[' -n '' ']' + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-rs2.yml /tmp/tmp.f8pe3qNJC3/statefulset_some-name-rs2.yml + compare_kubectl statefulset/some-name-cfg + local resource=statefulset/some-name-cfg + local postfix= + local skip_generation_check= + local expected_result=/mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-cfg.yml + local new_result=/tmp/tmp.f8pe3qNJC3/statefulset_some-name-cfg.yml + '[' -n '' -a -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-cfg-oc.yml ']' + kubectl_bin get -o yaml statefulset/some-name-cfg + yq eval ' del(.metadata.ownerReferences[].apiVersion) | del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "NAMESPACE")) | del(.metadata.selfLink) | del(.metadata.annotations."cloud.google.com/neg") | del(.metadata.annotations."kubectl.kubernetes.io/last-applied-configuration") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.status) | (.. | select(tag == "!!str")) |= sub("demand-backup-sharded-20810", "NAME_SPACE") | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "extensions/v1beta1")) = "apps/v1" | ++ mktemp (.. | select(. == "batch/v1beta1")) = "batch/v1" ' - + local LAST_OUT=/tmp/tmp.HaKjSOBL61 ++ mktemp + local LAST_ERR=/tmp/tmp.uTyFEp2l0j + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml statefulset/some-name-cfg + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.HaKjSOBL61 + cat /tmp/tmp.uTyFEp2l0j + rm /tmp/tmp.HaKjSOBL61 /tmp/tmp.uTyFEp2l0j + return 0 + yq -i eval 'del(.spec.persistentVolumeClaimRetentionPolicy)' /tmp/tmp.f8pe3qNJC3/statefulset_some-name-cfg.yml + version_gt 1.22 ++ echo '1.30 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + yq -i eval 'del(.spec.internalTrafficPolicy)' /tmp/tmp.f8pe3qNJC3/statefulset_some-name-cfg.yml + yq -i eval 'del(.spec.allocateLoadBalancerNodePorts)' /tmp/tmp.f8pe3qNJC3/statefulset_some-name-cfg.yml + [[ /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-cfg.yml == */cronjob* ]] + '[' -n '' ']' + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-cfg.yml /tmp/tmp.f8pe3qNJC3/statefulset_some-name-cfg.yml + compare_kubectl statefulset/some-name-mongos '' + local resource=statefulset/some-name-mongos + local postfix= + local skip_generation_check= + local expected_result=/mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-mongos.yml + local new_result=/tmp/tmp.f8pe3qNJC3/statefulset_some-name-mongos.yml + '[' -n '' -a -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-mongos-oc.yml ']' + kubectl_bin get -o yaml statefulset/some-name-mongos + yq eval ' del(.metadata.ownerReferences[].apiVersion) | del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "NAMESPACE")) | del(.metadata.selfLink) | del(.metadata.annotations."cloud.google.com/neg") | del(.metadata.annotations."kubectl.kubernetes.io/last-applied-configuration") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.status) | (.. | select(tag == "!!str")) |= sub("demand-backup-sharded-20810", "NAME_SPACE") | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "extensions/v1beta1")) = "apps/v1" | (.. | select(. == "batch/v1beta1")) = "batch/v1" ' - ++ mktemp + local LAST_OUT=/tmp/tmp.fcm2R3jYYE ++ mktemp + local LAST_ERR=/tmp/tmp.XNmASBzsx9 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml statefulset/some-name-mongos + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.fcm2R3jYYE + cat /tmp/tmp.XNmASBzsx9 + rm /tmp/tmp.fcm2R3jYYE /tmp/tmp.XNmASBzsx9 + return 0 + yq -i eval 'del(.spec.persistentVolumeClaimRetentionPolicy)' /tmp/tmp.f8pe3qNJC3/statefulset_some-name-mongos.yml + version_gt 1.22 ++ echo '1.30 >= 1.22' ++ bc -l + '[' 1 -eq 1 ']' + return 0 + yq -i eval 'del(.spec.internalTrafficPolicy)' /tmp/tmp.f8pe3qNJC3/statefulset_some-name-mongos.yml + yq -i eval 'del(.spec.allocateLoadBalancerNodePorts)' /tmp/tmp.f8pe3qNJC3/statefulset_some-name-mongos.yml + [[ /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-mongos.yml == */cronjob* ]] + '[' -n '' ']' + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-mongos.yml /tmp/tmp.f8pe3qNJC3/statefulset_some-name-mongos.yml + kubectl_bin apply -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/conf/mongos-secret.yml ++ mktemp + local LAST_OUT=/tmp/tmp.MYsFHWHU9t ++ mktemp + local LAST_ERR=/tmp/tmp.t2AUO0rirn + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/conf/mongos-secret.yml + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.MYsFHWHU9t secret/some-name-mongos created + cat /tmp/tmp.t2AUO0rirn + rm /tmp/tmp.MYsFHWHU9t /tmp/tmp.t2AUO0rirn + return 0 + sleep 10 + wait_for_running some-name-mongos 3 + local name=some-name-mongos + let last_pod=2 + local check_cluster_readyness=true + set_debug + [[ 1 == 1 ]] + set -o xtrace + local rs_name=mongos + local cluster_name=some-name ++ seq 0 2 + for i in '$(seq 0 $last_pod)' + [[ 0 -eq 2 ]] + wait_pod some-name-mongos-0 + local pod=some-name-mongos-0 + set +o xtrace waiting for pod/some-name-mongos-0 to be ready.OK + for i in '$(seq 0 $last_pod)' + [[ 1 -eq 2 ]] + wait_pod some-name-mongos-1 + local pod=some-name-mongos-1 + set +o xtrace waiting for pod/some-name-mongos-1 to be ready.OK + for i in '$(seq 0 $last_pod)' + [[ 2 -eq 2 ]] ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="mongos")].arbiter.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.QrykYgEtj7 +++ mktemp ++ local LAST_ERR=/tmp/tmp.dCkCq8Vqzd ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="mongos")].arbiter.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.QrykYgEtj7 ++ cat /tmp/tmp.dCkCq8Vqzd ++ rm /tmp/tmp.QrykYgEtj7 /tmp/tmp.dCkCq8Vqzd ++ return 0 + [[ '' == \t\r\u\e ]] + wait_pod some-name-mongos-2 + local pod=some-name-mongos-2 + set +o xtrace waiting for pod/some-name-mongos-2 to be ready.OK ++ kubectl_bin get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="mongos")].non_voting.enabled}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.EFxDtM6l0k +++ mktemp ++ local LAST_ERR=/tmp/tmp.idWRQ7qBaE ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.spec.replsets[?(@.name=="mongos")].non_voting.enabled}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.EFxDtM6l0k ++ cat /tmp/tmp.idWRQ7qBaE ++ rm /tmp/tmp.EFxDtM6l0k /tmp/tmp.idWRQ7qBaE ++ return 0 + [[ '' == \t\r\u\e ]] + sleep 10 + [[ true == \t\r\u\e ]] + set +x Waiting for cluster readyness.......................................................................................... + compare_kubectl statefulset/some-name-mongos -secret + local resource=statefulset/some-name-mongos + local postfix=-secret + local skip_generation_check= + local expected_result=/mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-mongos-secret.yml + local new_result=/tmp/tmp.f8pe3qNJC3/statefulset_some-name-mongos.yml + '[' -n '' -a -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-mongos-secret-oc.yml ']' + yq eval ' del(.metadata.ownerReferences[].apiVersion) | del(.metadata.managedFields) | del(.. | select(has("creationTimestamp")).creationTimestamp) | del(.. | select(has("namespace")).namespace) | del(.. | select(has("uid")).uid) | del(.metadata.resourceVersion) | del(.spec.template.spec.containers[].env[] | select(.name == "NAMESPACE")) | del(.metadata.selfLink) | del(.metadata.annotations."cloud.google.com/neg") | del(.metadata.annotations."kubectl.kubernetes.io/last-applied-configuration") | del(.. | select(has("image")).image) | del(.. | select(has("clusterIP")).clusterIP) | del(.. | select(has("clusterIPs")).clusterIPs) | del(.. | select(has("dataSource")).dataSource) | del(.. | select(has("procMount")).procMount) | del(.. | select(has("storageClassName")).storageClassName) | del(.. | select(has("finalizers")).finalizers) | del(.. | select(has("kubernetes.io/pvc-protection"))."kubernetes.io/pvc-protection") | del(.. | select(has("volumeName")).volumeName) | del(.. | select(has("volume.beta.kubernetes.io/storage-provisioner"))."volume.beta.kubernetes.io/storage-provisioner") | del(.. | select(has("volume.kubernetes.io/storage-provisioner"))."volume.kubernetes.io/storage-provisioner") | del(.spec.volumeMode) | del(.. | select(has("volume.kubernetes.io/selected-node"))."volume.kubernetes.io/selected-node") | del(.. | select(has("percona.com/last-config-hash"))."percona.com/last-config-hash") | del(.. | select(has("percona.com/configuration-hash"))."percona.com/configuration-hash") | del(.. | select(has("percona.com/ssl-hash"))."percona.com/ssl-hash") | del(.. | select(has("percona.com/ssl-internal-hash"))."percona.com/ssl-internal-hash") | del(.spec.volumeClaimTemplates[].spec.volumeMode | select(. == "Filesystem")) | del(.. | select(has("healthCheckNodePort")).healthCheckNodePort) | del(.. | select(has("nodePort")).nodePort) | del(.status) | (.. | select(tag == "!!str")) |= sub("demand-backup-sharded-20810", "NAME_SPACE") | del(.spec.volumeClaimTemplates[].apiVersion) | del(.spec.volumeClaimTemplates[].kind) | del(.spec.ipFamilies) | del(.spec.ipFamilyPolicy) | (.. | select(. == "extensions/v1beta1")) = "apps/v1" | (.. | select(. == "batch/v1beta1")) = "batch/v1" ' - + kubectl_bin get -o yaml statefulset/some-name-mongos ++ mktemp + local LAST_OUT=/tmp/tmp.YHV1Ae2UNY ++ mktemp + local LAST_ERR=/tmp/tmp.sxma22FV6l + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl get -o yaml statefulset/some-name-mongos + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.YHV1Ae2UNY + cat /tmp/tmp.sxma22FV6l + rm /tmp/tmp.YHV1Ae2UNY /tmp/tmp.sxma22FV6l + return 0 + yq -i eval 'del(.spec.persistentVolumeClaimRetentionPolicy)' /tmp/tmp.f8pe3qNJC3/statefulset_some-name-mongos.yml + version_gt 1.22 ++ bc -l ++ echo '1.30 >= 1.22' + '[' 1 -eq 1 ']' + return 0 + yq -i eval 'del(.spec.internalTrafficPolicy)' /tmp/tmp.f8pe3qNJC3/statefulset_some-name-mongos.yml + yq -i eval 'del(.spec.allocateLoadBalancerNodePorts)' /tmp/tmp.f8pe3qNJC3/statefulset_some-name-mongos.yml + [[ /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-mongos-secret.yml == */cronjob* ]] + '[' -n '' ']' + [[ 0 -eq 0 ]] + diff -u /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/compare/statefulset_some-name-mongos-secret.yml /tmp/tmp.f8pe3qNJC3/statefulset_some-name-mongos.yml + desc 'write data, read from all' + set +o xtrace ----------------------------------------------------------------------------------- write data, read from all ----------------------------------------------------------------------------------- + run_mongos 'db.createUser({user:"myApp",pwd:"myPass",roles:[{db:"myApp",role:"readWrite"},{db:"myApp1",role:"readWrite"},{db:"myApp2",role:"readWrite"}]})' userAdmin:userAdmin123456@some-name-mongos.demand-backup-sharded-20810 '' '' '' 27019 + local 'command=db.createUser({user:"myApp",pwd:"myPass",roles:[{db:"myApp",role:"readWrite"},{db:"myApp1",role:"readWrite"},{db:"myApp2",role:"readWrite"}]})' + local uri=userAdmin:userAdmin123456@some-name-mongos.demand-backup-sharded-20810 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo ++ echo .svc.cluster.local ++ awk -F: '{print $2}' + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Bt7nXDompJ +++ mktemp ++ local LAST_ERR=/tmp/tmp.uI15UVHYPe ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.Bt7nXDompJ ++ cat /tmp/tmp.uI15UVHYPe ++ rm /tmp/tmp.Bt7nXDompJ /tmp/tmp.uI15UVHYPe ++ return 0 + local client_container=psmdb-client-66f577db5f-62thq + kubectl_bin exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''db.createUser({user:"myApp",pwd:"myPass",roles:[{db:"myApp",role:"readWrite"},{db:"myApp1",role:"readWrite"},{db:"myApp2",role:"readWrite"}]})\n'\'' | mongo mongodb://userAdmin:userAdmin123456@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.DQF1zukY1j ++ mktemp + local LAST_ERR=/tmp/tmp.L0FUlfbqzh + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''db.createUser({user:"myApp",pwd:"myPass",roles:[{db:"myApp",role:"readWrite"},{db:"myApp1",role:"readWrite"},{db:"myApp2",role:"readWrite"}]})\n'\'' | mongo mongodb://userAdmin:userAdmin123456@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.DQF1zukY1j Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("cae4c0c2-39b7-46a1-b510-7a5d19dcb6b2") } Percona Server for MongoDB server version: v7.0.18-11 WARNING: shell and server versions do not match Successfully added user: { "user" : "myApp", "roles" : [ { "db" : "myApp", "role" : "readWrite" }, { "db" : "myApp1", "role" : "readWrite" }, { "db" : "myApp2", "role" : "readWrite" } ] } bye + cat /tmp/tmp.L0FUlfbqzh + rm /tmp/tmp.DQF1zukY1j /tmp/tmp.L0FUlfbqzh + return 0 + run_mongos 'sh.enableSharding("myApp","rs0")' clusterAdmin:clusterAdmin123456@some-name-mongos.demand-backup-sharded-20810 '' '' '' 27019 + local 'command=sh.enableSharding("myApp","rs0")' + local uri=clusterAdmin:clusterAdmin123456@some-name-mongos.demand-backup-sharded-20810 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo ++ awk -F: '{print $2}' ++ echo .svc.cluster.local + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.nyAbdsN7g1 +++ mktemp ++ local LAST_ERR=/tmp/tmp.9Ik9uPrvzz ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.nyAbdsN7g1 ++ cat /tmp/tmp.9Ik9uPrvzz ++ rm /tmp/tmp.nyAbdsN7g1 /tmp/tmp.9Ik9uPrvzz ++ return 0 + local client_container=psmdb-client-66f577db5f-62thq + kubectl_bin exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''sh.enableSharding("myApp","rs0")\n'\'' | mongo mongodb://clusterAdmin:clusterAdmin123456@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.iHCUdiO2sh ++ mktemp + local LAST_ERR=/tmp/tmp.el8PllFPLG + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''sh.enableSharding("myApp","rs0")\n'\'' | mongo mongodb://clusterAdmin:clusterAdmin123456@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.iHCUdiO2sh Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("67eda00e-9f9e-4850-8bc3-c29089c4ce4b") } Percona Server for MongoDB server version: v7.0.18-11 WARNING: shell and server versions do not match { "ok" : 1, "$clusterTime" : { "clusterTime" : Timestamp(1747917521, 9), "signature" : { "hash" : BinData(0,"EXd3m70NRMaLDhJNssc0710d7W8="), "keyId" : NumberLong("7507246853633605655") } }, "operationTime" : Timestamp(1747917521, 3) } bye + cat /tmp/tmp.el8PllFPLG + rm /tmp/tmp.iHCUdiO2sh /tmp/tmp.el8PllFPLG + return 0 + run_mongos 'sh.enableSharding("myApp1","rs1")' clusterAdmin:clusterAdmin123456@some-name-mongos.demand-backup-sharded-20810 '' '' '' 27019 + local 'command=sh.enableSharding("myApp1","rs1")' + local uri=clusterAdmin:clusterAdmin123456@some-name-mongos.demand-backup-sharded-20810 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo ++ awk -F: '{print $2}' ++ echo .svc.cluster.local + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ssURr6JQjB +++ mktemp ++ local LAST_ERR=/tmp/tmp.mghumAd8OT ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.ssURr6JQjB ++ cat /tmp/tmp.mghumAd8OT ++ rm /tmp/tmp.ssURr6JQjB /tmp/tmp.mghumAd8OT ++ return 0 + local client_container=psmdb-client-66f577db5f-62thq + kubectl_bin exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''sh.enableSharding("myApp1","rs1")\n'\'' | mongo mongodb://clusterAdmin:clusterAdmin123456@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.dw9EP8LCV1 ++ mktemp + local LAST_ERR=/tmp/tmp.d8OEfMGWmp + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''sh.enableSharding("myApp1","rs1")\n'\'' | mongo mongodb://clusterAdmin:clusterAdmin123456@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.dw9EP8LCV1 Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("232796eb-651a-4132-8dbe-5e0f5e2bc28e") } Percona Server for MongoDB server version: v7.0.18-11 WARNING: shell and server versions do not match { "ok" : 1, "$clusterTime" : { "clusterTime" : Timestamp(1747917525, 8), "signature" : { "hash" : BinData(0,"720gQwEN038Y1mEOo7pG669h5Zs="), "keyId" : NumberLong("7507246853633605655") } }, "operationTime" : Timestamp(1747917525, 3) } bye + cat /tmp/tmp.d8OEfMGWmp + rm /tmp/tmp.dw9EP8LCV1 /tmp/tmp.d8OEfMGWmp + return 0 + run_mongos 'sh.enableSharding("myApp2","rs2")' clusterAdmin:clusterAdmin123456@some-name-mongos.demand-backup-sharded-20810 '' '' '' 27019 + local 'command=sh.enableSharding("myApp2","rs2")' + local uri=clusterAdmin:clusterAdmin123456@some-name-mongos.demand-backup-sharded-20810 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo ++ awk -F: '{print $2}' ++ echo .svc.cluster.local + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Mun9TwKNbW +++ mktemp ++ local LAST_ERR=/tmp/tmp.J7mWX4NTBx ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.Mun9TwKNbW ++ cat /tmp/tmp.J7mWX4NTBx ++ rm /tmp/tmp.Mun9TwKNbW /tmp/tmp.J7mWX4NTBx ++ return 0 + local client_container=psmdb-client-66f577db5f-62thq + kubectl_bin exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''sh.enableSharding("myApp2","rs2")\n'\'' | mongo mongodb://clusterAdmin:clusterAdmin123456@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.AjV0zibEB8 ++ mktemp + local LAST_ERR=/tmp/tmp.XC8BYDfh6d + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''sh.enableSharding("myApp2","rs2")\n'\'' | mongo mongodb://clusterAdmin:clusterAdmin123456@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.AjV0zibEB8 Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("c9628eca-a89d-4de6-8fcc-da46298db01a") } Percona Server for MongoDB server version: v7.0.18-11 WARNING: shell and server versions do not match { "ok" : 1, "$clusterTime" : { "clusterTime" : Timestamp(1747917528, 7), "signature" : { "hash" : BinData(0,"N1fMSj17bODRKdb7eQF1QvL8sO0="), "keyId" : NumberLong("7507246853633605655") } }, "operationTime" : Timestamp(1747917528, 2) } bye + cat /tmp/tmp.XC8BYDfh6d + rm /tmp/tmp.AjV0zibEB8 /tmp/tmp.XC8BYDfh6d + return 0 + insert_data_mongos 100500 myApp '' 27019 + local data=100500 + local db_name=myApp + local flags= + local port=27019 + run_mongos 'use myApp\n db.test.insert({ x: 100500 })' myApp:myPass@some-name-mongos.demand-backup-sharded-20810 '' '' '' 27019 + local 'command=use myApp\n db.test.insert({ x: 100500 })' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo ++ awk -F: '{print $2}' ++ echo .svc.cluster.local + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.mDoWXgKx2M +++ mktemp ++ local LAST_ERR=/tmp/tmp.uw0v8GUARc ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.mDoWXgKx2M ++ cat /tmp/tmp.uw0v8GUARc ++ rm /tmp/tmp.mDoWXgKx2M /tmp/tmp.uw0v8GUARc ++ return 0 + local client_container=psmdb-client-66f577db5f-62thq + kubectl_bin exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp\n db.test.insert({ x: 100500 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.fZ9MpfNDTp ++ mktemp + local LAST_ERR=/tmp/tmp.ldHlNYMDPa + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp\n db.test.insert({ x: 100500 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.fZ9MpfNDTp Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("02761279-63d8-4d48-8393-23fea26f03a2") } Percona Server for MongoDB server version: v7.0.18-11 WARNING: shell and server versions do not match switched to db myApp WriteResult({ "nInserted" : 1 }) bye + cat /tmp/tmp.ldHlNYMDPa + rm /tmp/tmp.fZ9MpfNDTp /tmp/tmp.ldHlNYMDPa + return 0 + insert_data_mongos 100500 myApp1 '' 27019 + local data=100500 + local db_name=myApp1 + local flags= + local port=27019 + run_mongos 'use myApp1\n db.test.insert({ x: 100500 })' myApp:myPass@some-name-mongos.demand-backup-sharded-20810 '' '' '' 27019 + local 'command=use myApp1\n db.test.insert({ x: 100500 })' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo ++ awk -F: '{print $2}' ++ echo .svc.cluster.local + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.UB6iMRO1o9 +++ mktemp ++ local LAST_ERR=/tmp/tmp.0qCc56FD88 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.UB6iMRO1o9 ++ cat /tmp/tmp.0qCc56FD88 ++ rm /tmp/tmp.UB6iMRO1o9 /tmp/tmp.0qCc56FD88 ++ return 0 + local client_container=psmdb-client-66f577db5f-62thq + kubectl_bin exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp1\n db.test.insert({ x: 100500 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.9IKEMqdAnJ ++ mktemp + local LAST_ERR=/tmp/tmp.nWyj1ddwpv + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp1\n db.test.insert({ x: 100500 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.9IKEMqdAnJ Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("2f5e0e94-ea41-4ac7-a20e-ad7da3f3c67d") } Percona Server for MongoDB server version: v7.0.18-11 WARNING: shell and server versions do not match switched to db myApp1 WriteResult({ "nInserted" : 1 }) bye + cat /tmp/tmp.nWyj1ddwpv + rm /tmp/tmp.9IKEMqdAnJ /tmp/tmp.nWyj1ddwpv + return 0 + insert_data_mongos 100500 myApp2 '' 27019 + local data=100500 + local db_name=myApp2 + local flags= + local port=27019 + run_mongos 'use myApp2\n db.test.insert({ x: 100500 })' myApp:myPass@some-name-mongos.demand-backup-sharded-20810 '' '' '' 27019 + local 'command=use myApp2\n db.test.insert({ x: 100500 })' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo ++ echo .svc.cluster.local ++ awk -F: '{print $2}' + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.iHkVkShvYB +++ mktemp ++ local LAST_ERR=/tmp/tmp.yc8y5p82CB ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.iHkVkShvYB ++ cat /tmp/tmp.yc8y5p82CB ++ rm /tmp/tmp.iHkVkShvYB /tmp/tmp.yc8y5p82CB ++ return 0 + local client_container=psmdb-client-66f577db5f-62thq + kubectl_bin exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp2\n db.test.insert({ x: 100500 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.cVo8Y94aVM ++ mktemp + local LAST_ERR=/tmp/tmp.zOOeMClSjE + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp2\n db.test.insert({ x: 100500 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.cVo8Y94aVM Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("118a3aac-1809-4de4-aa8e-463873938482") } Percona Server for MongoDB server version: v7.0.18-11 WARNING: shell and server versions do not match switched to db myApp2 WriteResult({ "nInserted" : 1 }) bye + cat /tmp/tmp.zOOeMClSjE + rm /tmp/tmp.cVo8Y94aVM /tmp/tmp.zOOeMClSjE + return 0 + minikube_sleep + sleep_time=10 + [[ '' == 1 ]] + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-20810 '' '' '' '' 27019 + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local postfix= + local suffix= + local database=myApp + local collection=test + local port=27019 + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + run_mongos 'use myApp\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-20810 mongodb '' '' 27019 + local 'command=use myApp\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' ++ echo .svc.cluster.local ++ awk -F: '{print $2}' + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.PhHB9tlKMP +++ mktemp ++ local LAST_ERR=/tmp/tmp.nRryixKNE7 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.PhHB9tlKMP ++ cat /tmp/tmp.nRryixKNE7 ++ rm /tmp/tmp.PhHB9tlKMP /tmp/tmp.nRryixKNE7 ++ return 0 + local client_container=psmdb-client-66f577db5f-62thq + kubectl_bin exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.T05uc2tWXb ++ mktemp + local LAST_ERR=/tmp/tmp.Ab1RmmBAUk + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.T05uc2tWXb + cat /tmp/tmp.Ab1RmmBAUk + rm /tmp/tmp.T05uc2tWXb /tmp/tmp.Ab1RmmBAUk + return 0 + [[ 0 -eq 0 ]] + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/compare/find.json /tmp/tmp.f8pe3qNJC3/find + wait_backup_agent some-name-rs0-0 + local agent_pod=some-name-rs0-0 + set +o xtrace waiting for pbm-agent to be ready in some-name-rs0-0...2025-05-22T12:33:49.000+0000 I listening for the commands + wait_backup_agent some-name-rs0-1 + local agent_pod=some-name-rs0-1 + set +o xtrace waiting for pbm-agent to be ready in some-name-rs0-1...2025-05-22T12:33:51.000+0000 I listening for the commands + wait_backup_agent some-name-rs0-2 + local agent_pod=some-name-rs0-2 + set +o xtrace waiting for pbm-agent to be ready in some-name-rs0-2...2025-05-22T12:33:49.000+0000 I listening for the commands + wait_backup_agent some-name-rs1-0 + local agent_pod=some-name-rs1-0 + set +o xtrace waiting for pbm-agent to be ready in some-name-rs1-0...2025-05-22T12:33:50.000+0000 I listening for the commands + wait_backup_agent some-name-rs1-1 + local agent_pod=some-name-rs1-1 + set +o xtrace waiting for pbm-agent to be ready in some-name-rs1-1...2025-05-22T12:33:51.000+0000 I listening for the commands + wait_backup_agent some-name-rs1-2 + local agent_pod=some-name-rs1-2 + set +o xtrace waiting for pbm-agent to be ready in some-name-rs1-2...2025-05-22T12:33:54.000+0000 I listening for the commands + wait_backup_agent some-name-rs2-0 + local agent_pod=some-name-rs2-0 + set +o xtrace waiting for pbm-agent to be ready in some-name-rs2-0...2025-05-22T12:33:51.000+0000 I listening for the commands + wait_backup_agent some-name-rs2-1 + local agent_pod=some-name-rs2-1 + set +o xtrace waiting for pbm-agent to be ready in some-name-rs2-1...2025-05-22T12:33:51.000+0000 I listening for the commands + wait_backup_agent some-name-rs2-2 + local agent_pod=some-name-rs2-2 + set +o xtrace waiting for pbm-agent to be ready in some-name-rs2-2...2025-05-22T12:33:55.000+0000 I listening for the commands + backup_name_aws=backup-aws-s3 + backup_name_minio=backup-minio + backup_name_gcp=backup-gcp-cs + backup_name_azure=backup-azure-blob + desc 'run backups' + set +o xtrace ----------------------------------------------------------------------------------- run backups ----------------------------------------------------------------------------------- + run_backup minio + local storage=minio + local backup_name=backup-minio + local type=logical + desc 'run backup backup-minio' + set +o xtrace ----------------------------------------------------------------------------------- run backup backup-minio ----------------------------------------------------------------------------------- + yq eval '.metadata.name = "backup-minio" | .spec.storageName = "minio" | .spec.type = "logical"' /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/conf/backup-minio.yml + kubectl_bin apply -f - ++ mktemp + local LAST_OUT=/tmp/tmp.krjGWredGh ++ mktemp + local LAST_ERR=/tmp/tmp.nDVil4VyP0 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.krjGWredGh perconaservermongodbbackup.psmdb.percona.com/backup-minio created + cat /tmp/tmp.nDVil4VyP0 + rm /tmp/tmp.krjGWredGh /tmp/tmp.nDVil4VyP0 + return 0 + '[' -z '' ']' + run_backup aws-s3 + local storage=aws-s3 + local backup_name=backup-aws-s3 + local type=logical + desc 'run backup backup-aws-s3' + set +o xtrace ----------------------------------------------------------------------------------- run backup backup-aws-s3 ----------------------------------------------------------------------------------- + yq eval '.metadata.name = "backup-aws-s3" | .spec.storageName = "aws-s3" | .spec.type = "logical"' /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/conf/backup-aws-s3.yml + kubectl_bin apply -f - ++ mktemp + local LAST_OUT=/tmp/tmp.MJ0acH7EjW ++ mktemp + local LAST_ERR=/tmp/tmp.i4INGmrkS1 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.MJ0acH7EjW perconaservermongodbbackup.psmdb.percona.com/backup-aws-s3 created + cat /tmp/tmp.i4INGmrkS1 + rm /tmp/tmp.MJ0acH7EjW /tmp/tmp.i4INGmrkS1 + return 0 + run_backup gcp-cs + local storage=gcp-cs + local backup_name=backup-gcp-cs + local type=logical + desc 'run backup backup-gcp-cs' + set +o xtrace ----------------------------------------------------------------------------------- run backup backup-gcp-cs ----------------------------------------------------------------------------------- + yq eval '.metadata.name = "backup-gcp-cs" | .spec.storageName = "gcp-cs" | .spec.type = "logical"' /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/conf/backup-gcp-cs.yml + kubectl_bin apply -f - ++ mktemp + local LAST_OUT=/tmp/tmp.cyzQo7kAqG ++ mktemp + local LAST_ERR=/tmp/tmp.QM9Ym3Q4NF + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.cyzQo7kAqG perconaservermongodbbackup.psmdb.percona.com/backup-gcp-cs created + cat /tmp/tmp.QM9Ym3Q4NF + rm /tmp/tmp.cyzQo7kAqG /tmp/tmp.QM9Ym3Q4NF + return 0 + run_backup azure-blob + local storage=azure-blob + local backup_name=backup-azure-blob + local type=logical + desc 'run backup backup-azure-blob' + set +o xtrace ----------------------------------------------------------------------------------- run backup backup-azure-blob ----------------------------------------------------------------------------------- + kubectl_bin apply -f - + yq eval '.metadata.name = "backup-azure-blob" | .spec.storageName = "azure-blob" | .spec.type = "logical"' /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/conf/backup-azure-blob.yml ++ mktemp + local LAST_OUT=/tmp/tmp.s14jxX9SDh ++ mktemp + local LAST_ERR=/tmp/tmp.rUTPPTAnNJ + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.s14jxX9SDh perconaservermongodbbackup.psmdb.percona.com/backup-azure-blob created + cat /tmp/tmp.rUTPPTAnNJ + rm /tmp/tmp.s14jxX9SDh /tmp/tmp.rUTPPTAnNJ + return 0 + wait_backup backup-aws-s3 + local backup_name=backup-aws-s3 + local target_state=ready + set +o xtrace waiting for backup-aws-s3 to reach ready state......................................... + wait_backup backup-gcp-cs + local backup_name=backup-gcp-cs + local target_state=ready + set +o xtrace waiting for backup-gcp-cs to reach ready state. + wait_backup backup-azure-blob + local backup_name=backup-azure-blob + local target_state=ready + set +o xtrace waiting for backup-azure-blob to reach ready state.............. + wait_backup backup-minio + local backup_name=backup-minio + local target_state=ready + set +o xtrace waiting for backup-minio to reach ready state. + sleep 5 + '[' -z '' ']' + desc 'check backup and restore -- aws-s3' + set +o xtrace ----------------------------------------------------------------------------------- check backup and restore -- aws-s3 ----------------------------------------------------------------------------------- ++ get_backup_dest backup-aws-s3 ++ local backup_name=backup-aws-s3 ++ kubectl_bin get psmdb-backup backup-aws-s3 -o 'jsonpath={.status.destination}' ++ sed -e 's/.json$//' ++ sed 's|s3://||' ++ sed 's|azure://||' +++ mktemp ++ local LAST_OUT=/tmp/tmp.022HCLvz8o +++ mktemp ++ local LAST_ERR=/tmp/tmp.Og8aXfTMYL ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb-backup backup-aws-s3 -o 'jsonpath={.status.destination}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.022HCLvz8o ++ cat /tmp/tmp.Og8aXfTMYL ++ rm /tmp/tmp.022HCLvz8o /tmp/tmp.Og8aXfTMYL ++ return 0 + backup_dest_aws=operator-testing/psmdb-demand-backup-sharded/2025-05-22T12:40:17Z + curl -s https://s3.amazonaws.com/operator-testing/psmdb-demand-backup-sharded/2025-05-22T12:40:17Z/rs0/myApp.test.gz + gunzip + curl -s https://s3.amazonaws.com/operator-testing/psmdb-demand-backup-sharded/2025-05-22T12:40:17Z/rs1/myApp1.test.gz + gunzip + gunzip + curl -s https://s3.amazonaws.com/operator-testing/psmdb-demand-backup-sharded/2025-05-22T12:40:17Z/rs2/myApp2.test.gz + insert_data_mongos 100501 myApp '' 27019 + local data=100501 + local db_name=myApp + local flags= + local port=27019 + run_mongos 'use myApp\n db.test.insert({ x: 100501 })' myApp:myPass@some-name-mongos.demand-backup-sharded-20810 '' '' '' 27019 + local 'command=use myApp\n db.test.insert({ x: 100501 })' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo ++ echo .svc.cluster.local ++ awk -F: '{print $2}' + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.4xGXUH21Uo +++ mktemp ++ local LAST_ERR=/tmp/tmp.H7jP6aq0Zd ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.4xGXUH21Uo ++ cat /tmp/tmp.H7jP6aq0Zd ++ rm /tmp/tmp.4xGXUH21Uo /tmp/tmp.H7jP6aq0Zd ++ return 0 + local client_container=psmdb-client-66f577db5f-62thq + kubectl_bin exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.go1tVqj4CS ++ mktemp + local LAST_ERR=/tmp/tmp.pcbzbVRWzK + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.go1tVqj4CS Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("ce61433d-0f9d-46ba-9f54-db46c836bc53") } Percona Server for MongoDB server version: v7.0.18-11 WARNING: shell and server versions do not match switched to db myApp WriteResult({ "nInserted" : 1 }) bye + cat /tmp/tmp.pcbzbVRWzK + rm /tmp/tmp.go1tVqj4CS /tmp/tmp.pcbzbVRWzK + return 0 + insert_data_mongos 100501 myApp1 '' 27019 + local data=100501 + local db_name=myApp1 + local flags= + local port=27019 + run_mongos 'use myApp1\n db.test.insert({ x: 100501 })' myApp:myPass@some-name-mongos.demand-backup-sharded-20810 '' '' '' 27019 + local 'command=use myApp1\n db.test.insert({ x: 100501 })' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo ++ echo .svc.cluster.local ++ awk -F: '{print $2}' + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.bPUxB7DivI +++ mktemp ++ local LAST_ERR=/tmp/tmp.wcPhutfmTB ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.bPUxB7DivI ++ cat /tmp/tmp.wcPhutfmTB ++ rm /tmp/tmp.bPUxB7DivI /tmp/tmp.wcPhutfmTB ++ return 0 + local client_container=psmdb-client-66f577db5f-62thq + kubectl_bin exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp1\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.HhDbvO2qM3 ++ mktemp + local LAST_ERR=/tmp/tmp.QnhSt1BO35 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp1\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.HhDbvO2qM3 Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("3f07ac8f-9327-4e53-974c-bafdc8064295") } Percona Server for MongoDB server version: v7.0.18-11 WARNING: shell and server versions do not match switched to db myApp1 WriteResult({ "nInserted" : 1 }) bye + cat /tmp/tmp.QnhSt1BO35 + rm /tmp/tmp.HhDbvO2qM3 /tmp/tmp.QnhSt1BO35 + return 0 + insert_data_mongos 100501 myApp2 '' 27019 + local data=100501 + local db_name=myApp2 + local flags= + local port=27019 + run_mongos 'use myApp2\n db.test.insert({ x: 100501 })' myApp:myPass@some-name-mongos.demand-backup-sharded-20810 '' '' '' 27019 + local 'command=use myApp2\n db.test.insert({ x: 100501 })' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo ++ awk -F: '{print $2}' ++ echo .svc.cluster.local + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.UfBSIPUXRs +++ mktemp ++ local LAST_ERR=/tmp/tmp.L9IbVBLZF5 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.UfBSIPUXRs ++ cat /tmp/tmp.L9IbVBLZF5 ++ rm /tmp/tmp.UfBSIPUXRs /tmp/tmp.L9IbVBLZF5 ++ return 0 + local client_container=psmdb-client-66f577db5f-62thq + kubectl_bin exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp2\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.9CZcaM2wiq ++ mktemp + local LAST_ERR=/tmp/tmp.8hIXkqvhn7 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp2\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.9CZcaM2wiq Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("fce55e45-f1ae-44b1-9811-765d3ba27827") } Percona Server for MongoDB server version: v7.0.18-11 WARNING: shell and server versions do not match switched to db myApp2 WriteResult({ "nInserted" : 1 }) bye + cat /tmp/tmp.8hIXkqvhn7 + rm /tmp/tmp.9CZcaM2wiq /tmp/tmp.8hIXkqvhn7 + return 0 + check_data -2nd + local postfix=-2nd ++ seq 0 2 + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-20810 -2nd .svc.cluster.local myApp test 27019 + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local postfix=-2nd + local suffix=.svc.cluster.local + local database=myApp + local collection=test + local port=27019 + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + run_mongos 'use myApp\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-20810 mongodb .svc.cluster.local '' 27019 + local 'command=use myApp\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo ++ awk -F: '{print $2}' ++ echo .svc.cluster.local + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.LcSnjL3odP +++ mktemp ++ local LAST_ERR=/tmp/tmp.BgKj5fC0CK ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.LcSnjL3odP ++ cat /tmp/tmp.BgKj5fC0CK ++ rm /tmp/tmp.LcSnjL3odP /tmp/tmp.BgKj5fC0CK ++ return 0 + local client_container=psmdb-client-66f577db5f-62thq + kubectl_bin exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.xq198xK6uK ++ mktemp + local LAST_ERR=/tmp/tmp.nyEq0to29f + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.xq198xK6uK + cat /tmp/tmp.nyEq0to29f + rm /tmp/tmp.xq198xK6uK /tmp/tmp.nyEq0to29f + return 0 + [[ 0 -eq 0 ]] + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/compare/find-2nd.json /tmp/tmp.f8pe3qNJC3/find-2nd + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-20810 -2nd1 .svc.cluster.local myApp1 test 27019 + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local postfix=-2nd1 + local suffix=.svc.cluster.local + local database=myApp1 + local collection=test + local port=27019 + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + run_mongos 'use myApp1\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-20810 mongodb .svc.cluster.local '' 27019 + local 'command=use myApp1\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo ++ awk -F: '{print $2}' ++ echo .svc.cluster.local + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.cm5rzhcxZy +++ mktemp ++ local LAST_ERR=/tmp/tmp.1EGZ9THkrV ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.cm5rzhcxZy ++ cat /tmp/tmp.1EGZ9THkrV ++ rm /tmp/tmp.cm5rzhcxZy /tmp/tmp.1EGZ9THkrV ++ return 0 + local client_container=psmdb-client-66f577db5f-62thq + kubectl_bin exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp1\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.nGyASYbFu9 ++ mktemp + local LAST_ERR=/tmp/tmp.gAylpmabtv + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp1\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.nGyASYbFu9 + cat /tmp/tmp.gAylpmabtv + rm /tmp/tmp.nGyASYbFu9 /tmp/tmp.gAylpmabtv + return 0 + [[ 0 -eq 0 ]] + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/compare/find-2nd1.json /tmp/tmp.f8pe3qNJC3/find-2nd1 + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-20810 -2nd2 .svc.cluster.local myApp2 test 27019 + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local postfix=-2nd2 + local suffix=.svc.cluster.local + local database=myApp2 + local collection=test + local port=27019 + run_mongos 'use myApp2\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-20810 mongodb .svc.cluster.local '' 27019 + local 'command=use myApp2\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' ++ echo .svc.cluster.local ++ awk -F: '{print $2}' + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.SxgP6ra6G9 +++ mktemp ++ local LAST_ERR=/tmp/tmp.voemvVPel0 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.SxgP6ra6G9 ++ cat /tmp/tmp.voemvVPel0 ++ rm /tmp/tmp.SxgP6ra6G9 /tmp/tmp.voemvVPel0 ++ return 0 + local client_container=psmdb-client-66f577db5f-62thq + kubectl_bin exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp2\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.b1l5VvW5rA ++ mktemp + local LAST_ERR=/tmp/tmp.qU5zew6Ap2 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp2\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.b1l5VvW5rA + cat /tmp/tmp.qU5zew6Ap2 + rm /tmp/tmp.b1l5VvW5rA /tmp/tmp.qU5zew6Ap2 + return 0 + [[ 0 -eq 0 ]] + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/compare/find-2nd2.json /tmp/tmp.f8pe3qNJC3/find-2nd2 + run_restore backup-aws-s3 + local backup_name=backup-aws-s3 + cat /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/conf/restore.yml + /usr/bin/sed -e 's/backupName:/backupName: backup-aws-s3/' + kubectl_bin apply -f - + /usr/bin/sed -e 's/name:/name: restore-backup-aws-s3/' ++ mktemp + local LAST_OUT=/tmp/tmp.lCi6a9oMKF ++ mktemp + local LAST_ERR=/tmp/tmp.Jv05U3XvbC + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.lCi6a9oMKF perconaservermongodbrestore.psmdb.percona.com/restore-backup-aws-s3 created + cat /tmp/tmp.Jv05U3XvbC + rm /tmp/tmp.lCi6a9oMKF /tmp/tmp.Jv05U3XvbC + return 0 + wait_restore backup-aws-s3 some-name + local backup_name=backup-aws-s3 + local cluster_name=some-name + local target_state=ready + local wait_cluster_consistency=1 + local wait_time=1780 + local ok_if_ready=0 + set +o xtrace Waiting for the psmdb-restore/restore-backup-aws-s3 object to be createdOK Waiting psmdb-restore/restore-backup-aws-s3 to reach state "ready" .OK + [[ 1 -eq 1 ]] + wait_cluster_consistency some-name + local cluster_name=some-name + local wait_time=32 + retry=0 + sleep 7 + echo -n 'waiting for cluster readyness' waiting for cluster readyness++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.B31QhTaVbK +++ mktemp ++ local LAST_ERR=/tmp/tmp.QcSO88tAJL ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.B31QhTaVbK ++ cat /tmp/tmp.QcSO88tAJL ++ rm /tmp/tmp.B31QhTaVbK /tmp/tmp.QcSO88tAJL ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 1 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.bWdjebjwc2 +++ mktemp ++ local LAST_ERR=/tmp/tmp.EQvQSGzA0e ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.bWdjebjwc2 ++ cat /tmp/tmp.EQvQSGzA0e ++ rm /tmp/tmp.bWdjebjwc2 /tmp/tmp.EQvQSGzA0e ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 2 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.BTu43le2CX +++ mktemp ++ local LAST_ERR=/tmp/tmp.8GgB90QW3U ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.BTu43le2CX ++ cat /tmp/tmp.8GgB90QW3U ++ rm /tmp/tmp.BTu43le2CX /tmp/tmp.8GgB90QW3U ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 3 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.iL7s1x4u2J +++ mktemp ++ local LAST_ERR=/tmp/tmp.paL5sDMHIQ ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.iL7s1x4u2J ++ cat /tmp/tmp.paL5sDMHIQ ++ rm /tmp/tmp.iL7s1x4u2J /tmp/tmp.paL5sDMHIQ ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 4 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.MXu74YQYrT +++ mktemp ++ local LAST_ERR=/tmp/tmp.p8aLC9W1It ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.MXu74YQYrT ++ cat /tmp/tmp.p8aLC9W1It ++ rm /tmp/tmp.MXu74YQYrT /tmp/tmp.p8aLC9W1It ++ return 0 + [[ ready == \r\e\a\d\y ]] + echo + check_data + local postfix= ++ seq 0 2 + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-20810 '' .svc.cluster.local myApp test 27019 + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local postfix= + local suffix=.svc.cluster.local + local database=myApp + local collection=test + local port=27019 + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' + run_mongos 'use myApp\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-20810 mongodb .svc.cluster.local '' 27019 + local 'command=use myApp\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo ++ echo .svc.cluster.local ++ awk -F: '{print $2}' + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.GwuaScvQqV +++ mktemp ++ local LAST_ERR=/tmp/tmp.kHkSoMtzCJ ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.GwuaScvQqV ++ cat /tmp/tmp.kHkSoMtzCJ ++ rm /tmp/tmp.GwuaScvQqV /tmp/tmp.kHkSoMtzCJ ++ return 0 + local client_container=psmdb-client-66f577db5f-62thq + kubectl_bin exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.FlvYaVSplb ++ mktemp + local LAST_ERR=/tmp/tmp.coArOZhP1W + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.FlvYaVSplb + cat /tmp/tmp.coArOZhP1W + rm /tmp/tmp.FlvYaVSplb /tmp/tmp.coArOZhP1W + return 0 + [[ 0 -eq 0 ]] + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/compare/find.json /tmp/tmp.f8pe3qNJC3/find + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-20810 1 .svc.cluster.local myApp1 test 27019 + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local postfix=1 + local suffix=.svc.cluster.local + local database=myApp1 + local collection=test + local port=27019 + run_mongos 'use myApp1\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-20810 mongodb .svc.cluster.local '' 27019 + local 'command=use myApp1\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' ++ awk -F: '{print $2}' ++ echo .svc.cluster.local + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.byDuYf5AVO +++ mktemp ++ local LAST_ERR=/tmp/tmp.a0vmumo1Pd ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.byDuYf5AVO ++ cat /tmp/tmp.a0vmumo1Pd ++ rm /tmp/tmp.byDuYf5AVO /tmp/tmp.a0vmumo1Pd ++ return 0 + local client_container=psmdb-client-66f577db5f-62thq + kubectl_bin exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp1\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.kYeiSNMP0L ++ mktemp + local LAST_ERR=/tmp/tmp.eRzRjw4xFh + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp1\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.kYeiSNMP0L + cat /tmp/tmp.eRzRjw4xFh + rm /tmp/tmp.kYeiSNMP0L /tmp/tmp.eRzRjw4xFh + return 0 + [[ 0 -eq 0 ]] + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/compare/find1.json /tmp/tmp.f8pe3qNJC3/find1 + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-20810 2 .svc.cluster.local myApp2 test 27019 + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local postfix=2 + local suffix=.svc.cluster.local + local database=myApp2 + local collection=test + local port=27019 + run_mongos 'use myApp2\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-20810 mongodb .svc.cluster.local '' 27019 + local 'command=use myApp2\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' ++ awk -F: '{print $2}' ++ echo .svc.cluster.local + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.h5OXivgafW +++ mktemp ++ local LAST_ERR=/tmp/tmp.lVYL4Vcrir ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.h5OXivgafW ++ cat /tmp/tmp.lVYL4Vcrir ++ rm /tmp/tmp.h5OXivgafW /tmp/tmp.lVYL4Vcrir ++ return 0 + local client_container=psmdb-client-66f577db5f-62thq + kubectl_bin exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp2\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.W5tXwKHcLd ++ mktemp + local LAST_ERR=/tmp/tmp.gUf7KShS8a + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp2\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.W5tXwKHcLd + cat /tmp/tmp.gUf7KShS8a + rm /tmp/tmp.W5tXwKHcLd /tmp/tmp.gUf7KShS8a + return 0 + [[ 0 -eq 0 ]] + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/compare/find2.json /tmp/tmp.f8pe3qNJC3/find2 + desc 'check backup and restore -- gcp-cs' + set +o xtrace ----------------------------------------------------------------------------------- check backup and restore -- gcp-cs ----------------------------------------------------------------------------------- ++ get_backup_dest backup-gcp-cs ++ local backup_name=backup-gcp-cs ++ kubectl_bin get psmdb-backup backup-gcp-cs -o 'jsonpath={.status.destination}' ++ sed -e 's/.json$//' ++ sed 's|s3://||' +++ mktemp ++ sed 's|azure://||' ++ local LAST_OUT=/tmp/tmp.QNJt5NWnuB +++ mktemp ++ local LAST_ERR=/tmp/tmp.LX4QVD1XNh ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb-backup backup-gcp-cs -o 'jsonpath={.status.destination}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.QNJt5NWnuB ++ cat /tmp/tmp.LX4QVD1XNh ++ rm /tmp/tmp.QNJt5NWnuB /tmp/tmp.LX4QVD1XNh ++ return 0 + backup_dest_gcp=operator-testing/psmdb-demand-backup-sharded/2025-05-22T12:39:44Z + gunzip + curl -s https://storage.googleapis.com/operator-testing/psmdb-demand-backup-sharded/2025-05-22T12:39:44Z/rs0/myApp.test.gz + curl -s https://storage.googleapis.com/operator-testing/psmdb-demand-backup-sharded/2025-05-22T12:39:44Z/rs1/myApp1.test.gz + gunzip + gunzip + curl -s https://storage.googleapis.com/operator-testing/psmdb-demand-backup-sharded/2025-05-22T12:39:44Z/rs2/myApp2.test.gz + insert_data_mongos 100501 myApp '' 27019 + local data=100501 + local db_name=myApp + local flags= + local port=27019 + run_mongos 'use myApp\n db.test.insert({ x: 100501 })' myApp:myPass@some-name-mongos.demand-backup-sharded-20810 '' '' '' 27019 + local 'command=use myApp\n db.test.insert({ x: 100501 })' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo ++ awk -F: '{print $2}' ++ echo .svc.cluster.local + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.OCm5TF3S6l +++ mktemp ++ local LAST_ERR=/tmp/tmp.HIZ9d7mY7m ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.OCm5TF3S6l ++ cat /tmp/tmp.HIZ9d7mY7m ++ rm /tmp/tmp.OCm5TF3S6l /tmp/tmp.HIZ9d7mY7m ++ return 0 + local client_container=psmdb-client-66f577db5f-62thq + kubectl_bin exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.mDkEMBAurL ++ mktemp + local LAST_ERR=/tmp/tmp.OlvhqwFc71 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.mDkEMBAurL Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("fb2390f2-489e-4361-a5e9-81740e347e5d") } Percona Server for MongoDB server version: v7.0.18-11 WARNING: shell and server versions do not match switched to db myApp WriteResult({ "nInserted" : 1 }) bye + cat /tmp/tmp.OlvhqwFc71 + rm /tmp/tmp.mDkEMBAurL /tmp/tmp.OlvhqwFc71 + return 0 + insert_data_mongos 100501 myApp1 '' 27019 + local data=100501 + local db_name=myApp1 + local flags= + local port=27019 + run_mongos 'use myApp1\n db.test.insert({ x: 100501 })' myApp:myPass@some-name-mongos.demand-backup-sharded-20810 '' '' '' 27019 + local 'command=use myApp1\n db.test.insert({ x: 100501 })' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo ++ echo .svc.cluster.local ++ awk -F: '{print $2}' + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.XBdy8LI018 +++ mktemp ++ local LAST_ERR=/tmp/tmp.CRVZhOG9yH ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.XBdy8LI018 ++ cat /tmp/tmp.CRVZhOG9yH ++ rm /tmp/tmp.XBdy8LI018 /tmp/tmp.CRVZhOG9yH ++ return 0 + local client_container=psmdb-client-66f577db5f-62thq + kubectl_bin exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp1\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.yofn9Al4Aj ++ mktemp + local LAST_ERR=/tmp/tmp.YQzJGmNGa5 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp1\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.yofn9Al4Aj Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("443f6825-7003-4bd0-ac1a-133486d36fba") } Percona Server for MongoDB server version: v7.0.18-11 WARNING: shell and server versions do not match switched to db myApp1 WriteResult({ "nInserted" : 1 }) bye + cat /tmp/tmp.YQzJGmNGa5 + rm /tmp/tmp.yofn9Al4Aj /tmp/tmp.YQzJGmNGa5 + return 0 + insert_data_mongos 100501 myApp2 '' 27019 + local data=100501 + local db_name=myApp2 + local flags= + local port=27019 + run_mongos 'use myApp2\n db.test.insert({ x: 100501 })' myApp:myPass@some-name-mongos.demand-backup-sharded-20810 '' '' '' 27019 + local 'command=use myApp2\n db.test.insert({ x: 100501 })' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo ++ awk -F: '{print $2}' ++ echo .svc.cluster.local + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.hcOJRi9E0c +++ mktemp ++ local LAST_ERR=/tmp/tmp.yUzX8g7gMI ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.hcOJRi9E0c ++ cat /tmp/tmp.yUzX8g7gMI ++ rm /tmp/tmp.hcOJRi9E0c /tmp/tmp.yUzX8g7gMI ++ return 0 + local client_container=psmdb-client-66f577db5f-62thq + kubectl_bin exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp2\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.1c6RMeFu1x ++ mktemp + local LAST_ERR=/tmp/tmp.x5XcU4H8xn + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp2\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.1c6RMeFu1x Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("0138ac76-a8bf-43e7-b625-38195834fcac") } Percona Server for MongoDB server version: v7.0.18-11 WARNING: shell and server versions do not match switched to db myApp2 WriteResult({ "nInserted" : 1 }) bye + cat /tmp/tmp.x5XcU4H8xn + rm /tmp/tmp.1c6RMeFu1x /tmp/tmp.x5XcU4H8xn + return 0 + check_data -2nd + local postfix=-2nd ++ seq 0 2 + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-20810 -2nd .svc.cluster.local myApp test 27019 + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local postfix=-2nd + local suffix=.svc.cluster.local + local database=myApp + local collection=test + local port=27019 + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + run_mongos 'use myApp\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-20810 mongodb .svc.cluster.local '' 27019 + local 'command=use myApp\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo ++ echo .svc.cluster.local ++ awk -F: '{print $2}' + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' ++ local LAST_OUT=/tmp/tmp.Aa6tazPsHo +++ mktemp ++ local LAST_ERR=/tmp/tmp.R5z8EY0ih9 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.Aa6tazPsHo ++ cat /tmp/tmp.R5z8EY0ih9 ++ rm /tmp/tmp.Aa6tazPsHo /tmp/tmp.R5z8EY0ih9 ++ return 0 + local client_container=psmdb-client-66f577db5f-62thq + kubectl_bin exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.v2UOm8T98R ++ mktemp + local LAST_ERR=/tmp/tmp.6JvA5yHNjU + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.v2UOm8T98R + cat /tmp/tmp.6JvA5yHNjU + rm /tmp/tmp.v2UOm8T98R /tmp/tmp.6JvA5yHNjU + return 0 + [[ 0 -eq 0 ]] + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/compare/find-2nd.json /tmp/tmp.f8pe3qNJC3/find-2nd + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-20810 -2nd1 .svc.cluster.local myApp1 test 27019 + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local postfix=-2nd1 + local suffix=.svc.cluster.local + local database=myApp1 + local collection=test + local port=27019 + run_mongos 'use myApp1\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-20810 mongodb .svc.cluster.local '' 27019 + local 'command=use myApp1\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' ++ awk -F: '{print $2}' ++ echo .svc.cluster.local + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.VlwVlBq4PB +++ mktemp ++ local LAST_ERR=/tmp/tmp.HqiWKhLPAD ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.VlwVlBq4PB ++ cat /tmp/tmp.HqiWKhLPAD ++ rm /tmp/tmp.VlwVlBq4PB /tmp/tmp.HqiWKhLPAD ++ return 0 + local client_container=psmdb-client-66f577db5f-62thq + kubectl_bin exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp1\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.AADRM8ZMef ++ mktemp + local LAST_ERR=/tmp/tmp.ZEhhJx4wiV + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp1\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.AADRM8ZMef + cat /tmp/tmp.ZEhhJx4wiV + rm /tmp/tmp.AADRM8ZMef /tmp/tmp.ZEhhJx4wiV + return 0 + [[ 0 -eq 0 ]] + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/compare/find-2nd1.json /tmp/tmp.f8pe3qNJC3/find-2nd1 + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-20810 -2nd2 .svc.cluster.local myApp2 test 27019 + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local postfix=-2nd2 + local suffix=.svc.cluster.local + local database=myApp2 + local collection=test + local port=27019 + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + run_mongos 'use myApp2\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-20810 mongodb .svc.cluster.local '' 27019 + local 'command=use myApp2\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo ++ echo .svc.cluster.local ++ awk -F: '{print $2}' + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' ++ local LAST_OUT=/tmp/tmp.IX2LQYbqAV +++ mktemp ++ local LAST_ERR=/tmp/tmp.7wuNJ5HxUj ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.IX2LQYbqAV ++ cat /tmp/tmp.7wuNJ5HxUj ++ rm /tmp/tmp.IX2LQYbqAV /tmp/tmp.7wuNJ5HxUj ++ return 0 + local client_container=psmdb-client-66f577db5f-62thq + kubectl_bin exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp2\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.AZsB38raCC ++ mktemp + local LAST_ERR=/tmp/tmp.GHmDGWhXqa + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp2\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.AZsB38raCC + cat /tmp/tmp.GHmDGWhXqa + rm /tmp/tmp.AZsB38raCC /tmp/tmp.GHmDGWhXqa + return 0 + [[ 0 -eq 0 ]] + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/compare/find-2nd2.json /tmp/tmp.f8pe3qNJC3/find-2nd2 + run_restore backup-gcp-cs + local backup_name=backup-gcp-cs + cat /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/conf/restore.yml + /usr/bin/sed -e 's/backupName:/backupName: backup-gcp-cs/' + /usr/bin/sed -e 's/name:/name: restore-backup-gcp-cs/' + kubectl_bin apply -f - ++ mktemp + local LAST_OUT=/tmp/tmp.djvoeapSbh ++ mktemp + local LAST_ERR=/tmp/tmp.ElvKHfDvxP + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.djvoeapSbh perconaservermongodbrestore.psmdb.percona.com/restore-backup-gcp-cs created + cat /tmp/tmp.ElvKHfDvxP + rm /tmp/tmp.djvoeapSbh /tmp/tmp.ElvKHfDvxP + return 0 + wait_restore backup-gcp-cs some-name + local backup_name=backup-gcp-cs + local cluster_name=some-name + local target_state=ready + local wait_cluster_consistency=1 + local wait_time=1780 + local ok_if_ready=0 + set +o xtrace Waiting for the psmdb-restore/restore-backup-gcp-cs object to be createdOK Waiting psmdb-restore/restore-backup-gcp-cs to reach state "ready" .OK + [[ 1 -eq 1 ]] + wait_cluster_consistency some-name + local cluster_name=some-name + local wait_time=32 + retry=0 + sleep 7 + echo -n 'waiting for cluster readyness' waiting for cluster readyness++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.dGnRsx2fQi +++ mktemp ++ local LAST_ERR=/tmp/tmp.YzXxPqFY5P ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.dGnRsx2fQi ++ cat /tmp/tmp.YzXxPqFY5P ++ rm /tmp/tmp.dGnRsx2fQi /tmp/tmp.YzXxPqFY5P ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 1 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Y1tBT6cshU +++ mktemp ++ local LAST_ERR=/tmp/tmp.ltWPSvx9Gi ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.Y1tBT6cshU ++ cat /tmp/tmp.ltWPSvx9Gi ++ rm /tmp/tmp.Y1tBT6cshU /tmp/tmp.ltWPSvx9Gi ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 2 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.28PDb1ioFf +++ mktemp ++ local LAST_ERR=/tmp/tmp.NKhlcBOL94 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.28PDb1ioFf ++ cat /tmp/tmp.NKhlcBOL94 ++ rm /tmp/tmp.28PDb1ioFf /tmp/tmp.NKhlcBOL94 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 3 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Ve8uWeYrl4 +++ mktemp ++ local LAST_ERR=/tmp/tmp.nYRisCtBud ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.Ve8uWeYrl4 ++ cat /tmp/tmp.nYRisCtBud ++ rm /tmp/tmp.Ve8uWeYrl4 /tmp/tmp.nYRisCtBud ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 4 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Kkeu7AtVUJ +++ mktemp ++ local LAST_ERR=/tmp/tmp.2ssLVsc7ZV ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.Kkeu7AtVUJ ++ cat /tmp/tmp.2ssLVsc7ZV ++ rm /tmp/tmp.Kkeu7AtVUJ /tmp/tmp.2ssLVsc7ZV ++ return 0 + [[ ready == \r\e\a\d\y ]] + echo + check_data + local postfix= ++ seq 0 2 + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-20810 '' .svc.cluster.local myApp test 27019 + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local postfix= + local suffix=.svc.cluster.local + local database=myApp + local collection=test + local port=27019 + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + run_mongos 'use myApp\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-20810 mongodb .svc.cluster.local '' 27019 + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' + local 'command=use myApp\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo ++ awk -F: '{print $2}' ++ echo .svc.cluster.local + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.SP4DWnBCuS +++ mktemp ++ local LAST_ERR=/tmp/tmp.2j48Ao8ZRA ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.SP4DWnBCuS ++ cat /tmp/tmp.2j48Ao8ZRA ++ rm /tmp/tmp.SP4DWnBCuS /tmp/tmp.2j48Ao8ZRA ++ return 0 + local client_container=psmdb-client-66f577db5f-62thq + kubectl_bin exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.0yJ3kA6jkX ++ mktemp + local LAST_ERR=/tmp/tmp.MtwjbsE0gS + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.0yJ3kA6jkX + cat /tmp/tmp.MtwjbsE0gS + rm /tmp/tmp.0yJ3kA6jkX /tmp/tmp.MtwjbsE0gS + return 0 + [[ 0 -eq 0 ]] + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/compare/find.json /tmp/tmp.f8pe3qNJC3/find + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-20810 1 .svc.cluster.local myApp1 test 27019 + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local postfix=1 + local suffix=.svc.cluster.local + local database=myApp1 + local collection=test + local port=27019 + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' + run_mongos 'use myApp1\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-20810 mongodb .svc.cluster.local '' 27019 + local 'command=use myApp1\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo ++ echo .svc.cluster.local ++ awk -F: '{print $2}' + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.QZdeFcf5RL +++ mktemp ++ local LAST_ERR=/tmp/tmp.zzzmew79dP ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.QZdeFcf5RL ++ cat /tmp/tmp.zzzmew79dP ++ rm /tmp/tmp.QZdeFcf5RL /tmp/tmp.zzzmew79dP ++ return 0 + local client_container=psmdb-client-66f577db5f-62thq + kubectl_bin exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp1\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.ouj3g9x56N ++ mktemp + local LAST_ERR=/tmp/tmp.mds0o2e04D + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp1\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.ouj3g9x56N + cat /tmp/tmp.mds0o2e04D + rm /tmp/tmp.ouj3g9x56N /tmp/tmp.mds0o2e04D + return 0 + [[ 0 -eq 0 ]] + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/compare/find1.json /tmp/tmp.f8pe3qNJC3/find1 + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-20810 2 .svc.cluster.local myApp2 test 27019 + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local postfix=2 + local suffix=.svc.cluster.local + local database=myApp2 + local collection=test + local port=27019 + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + run_mongos 'use myApp2\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-20810 mongodb .svc.cluster.local '' 27019 + local 'command=use myApp2\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo ++ awk -F: '{print $2}' ++ echo .svc.cluster.local + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.JQ60I1GFUi +++ mktemp ++ local LAST_ERR=/tmp/tmp.wpYzTkvaJP ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.JQ60I1GFUi ++ cat /tmp/tmp.wpYzTkvaJP ++ rm /tmp/tmp.JQ60I1GFUi /tmp/tmp.wpYzTkvaJP ++ return 0 + local client_container=psmdb-client-66f577db5f-62thq + kubectl_bin exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp2\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.GnQVafIEr3 ++ mktemp + local LAST_ERR=/tmp/tmp.huptFvtnMI + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp2\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.GnQVafIEr3 + cat /tmp/tmp.huptFvtnMI + rm /tmp/tmp.GnQVafIEr3 /tmp/tmp.huptFvtnMI + return 0 + [[ 0 -eq 0 ]] + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/compare/find2.json /tmp/tmp.f8pe3qNJC3/find2 + desc 'check backup and restore -- azure-blob' + set +o xtrace ----------------------------------------------------------------------------------- check backup and restore -- azure-blob ----------------------------------------------------------------------------------- ++ get_backup_dest backup-azure-blob ++ local backup_name=backup-azure-blob ++ kubectl_bin get psmdb-backup backup-azure-blob -o 'jsonpath={.status.destination}' ++ sed 's|azure://||' ++ sed 's|s3://||' ++ sed -e 's/.json$//' +++ mktemp ++ local LAST_OUT=/tmp/tmp.3us5FzOGqF +++ mktemp ++ local LAST_ERR=/tmp/tmp.cI92gygWkF ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb-backup backup-azure-blob -o 'jsonpath={.status.destination}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.3us5FzOGqF ++ cat /tmp/tmp.cI92gygWkF ++ rm /tmp/tmp.3us5FzOGqF /tmp/tmp.cI92gygWkF ++ return 0 + backup_dest_azure=operator-testing/psmdb-demand-backup-sharded/2025-05-22T12:40:49Z + curl -s https://engk8soperators.blob.core.windows.net/operator-testing/psmdb-demand-backup-sharded/2025-05-22T12:40:49Z/rs0/myApp.test.gz + gunzip + gunzip + curl -s https://engk8soperators.blob.core.windows.net/operator-testing/psmdb-demand-backup-sharded/2025-05-22T12:40:49Z/rs1/myApp1.test.gz + gunzip + curl -s https://engk8soperators.blob.core.windows.net/operator-testing/psmdb-demand-backup-sharded/2025-05-22T12:40:49Z/rs2/myApp2.test.gz + insert_data_mongos 100501 myApp '' 27019 + local data=100501 + local db_name=myApp + local flags= + local port=27019 + run_mongos 'use myApp\n db.test.insert({ x: 100501 })' myApp:myPass@some-name-mongos.demand-backup-sharded-20810 '' '' '' 27019 + local 'command=use myApp\n db.test.insert({ x: 100501 })' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo ++ echo .svc.cluster.local ++ awk -F: '{print $2}' + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.XIa9CSyrr5 +++ mktemp ++ local LAST_ERR=/tmp/tmp.vFQeKV3rnM ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.XIa9CSyrr5 ++ cat /tmp/tmp.vFQeKV3rnM ++ rm /tmp/tmp.XIa9CSyrr5 /tmp/tmp.vFQeKV3rnM ++ return 0 + local client_container=psmdb-client-66f577db5f-62thq + kubectl_bin exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.m4AH6ct460 ++ mktemp + local LAST_ERR=/tmp/tmp.T0qBa0sFG0 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.m4AH6ct460 Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("c0ca4c3a-38b5-4643-9af6-b61bdfc2cd46") } Percona Server for MongoDB server version: v7.0.18-11 WARNING: shell and server versions do not match switched to db myApp WriteResult({ "nInserted" : 1 }) bye + cat /tmp/tmp.T0qBa0sFG0 + rm /tmp/tmp.m4AH6ct460 /tmp/tmp.T0qBa0sFG0 + return 0 + insert_data_mongos 100501 myApp1 '' 27019 + local data=100501 + local db_name=myApp1 + local flags= + local port=27019 + run_mongos 'use myApp1\n db.test.insert({ x: 100501 })' myApp:myPass@some-name-mongos.demand-backup-sharded-20810 '' '' '' 27019 + local 'command=use myApp1\n db.test.insert({ x: 100501 })' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo ++ echo .svc.cluster.local ++ awk -F: '{print $2}' + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.v7Ag0tILpq +++ mktemp ++ local LAST_ERR=/tmp/tmp.rDnI3fh8TU ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.v7Ag0tILpq ++ cat /tmp/tmp.rDnI3fh8TU ++ rm /tmp/tmp.v7Ag0tILpq /tmp/tmp.rDnI3fh8TU ++ return 0 + local client_container=psmdb-client-66f577db5f-62thq + kubectl_bin exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp1\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.3ltk4opSZQ ++ mktemp + local LAST_ERR=/tmp/tmp.NjYw6UxZ4F + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp1\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.3ltk4opSZQ Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("c1209b22-42d0-47fa-a10d-12d6e83b212b") } Percona Server for MongoDB server version: v7.0.18-11 WARNING: shell and server versions do not match switched to db myApp1 WriteResult({ "nInserted" : 1 }) bye + cat /tmp/tmp.NjYw6UxZ4F + rm /tmp/tmp.3ltk4opSZQ /tmp/tmp.NjYw6UxZ4F + return 0 + insert_data_mongos 100501 myApp2 '' 27019 + local data=100501 + local db_name=myApp2 + local flags= + local port=27019 + run_mongos 'use myApp2\n db.test.insert({ x: 100501 })' myApp:myPass@some-name-mongos.demand-backup-sharded-20810 '' '' '' 27019 + local 'command=use myApp2\n db.test.insert({ x: 100501 })' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo ++ echo .svc.cluster.local ++ awk -F: '{print $2}' + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.EtPjbsClYv +++ mktemp ++ local LAST_ERR=/tmp/tmp.rrAPl54etw ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.EtPjbsClYv ++ cat /tmp/tmp.rrAPl54etw ++ rm /tmp/tmp.EtPjbsClYv /tmp/tmp.rrAPl54etw ++ return 0 + local client_container=psmdb-client-66f577db5f-62thq + kubectl_bin exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp2\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.o34YBL25Cn ++ mktemp + local LAST_ERR=/tmp/tmp.gZS5kmmjvM + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp2\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.o34YBL25Cn Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("97293624-b0c6-4b9a-b67c-54bba8746343") } Percona Server for MongoDB server version: v7.0.18-11 WARNING: shell and server versions do not match switched to db myApp2 WriteResult({ "nInserted" : 1 }) bye + cat /tmp/tmp.gZS5kmmjvM + rm /tmp/tmp.o34YBL25Cn /tmp/tmp.gZS5kmmjvM + return 0 + check_data -2nd + local postfix=-2nd ++ seq 0 2 + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-20810 -2nd .svc.cluster.local myApp test 27019 + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local postfix=-2nd + local suffix=.svc.cluster.local + local database=myApp + local collection=test + local port=27019 + run_mongos 'use myApp\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-20810 mongodb .svc.cluster.local '' 27019 + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + local 'command=use myApp\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' ++ echo .svc.cluster.local ++ awk -F: '{print $2}' + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.DVOS2cE36I +++ mktemp ++ local LAST_ERR=/tmp/tmp.gbNTlNQq6A ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.DVOS2cE36I ++ cat /tmp/tmp.gbNTlNQq6A ++ rm /tmp/tmp.DVOS2cE36I /tmp/tmp.gbNTlNQq6A ++ return 0 + local client_container=psmdb-client-66f577db5f-62thq + kubectl_bin exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.WuMzJEA0iG ++ mktemp + local LAST_ERR=/tmp/tmp.fmcFC5dW2I + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.WuMzJEA0iG + cat /tmp/tmp.fmcFC5dW2I + rm /tmp/tmp.WuMzJEA0iG /tmp/tmp.fmcFC5dW2I + return 0 + [[ 0 -eq 0 ]] + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/compare/find-2nd.json /tmp/tmp.f8pe3qNJC3/find-2nd + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-20810 -2nd1 .svc.cluster.local myApp1 test 27019 + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local postfix=-2nd1 + local suffix=.svc.cluster.local + local database=myApp1 + local collection=test + local port=27019 + run_mongos 'use myApp1\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-20810 mongodb .svc.cluster.local '' 27019 + local 'command=use myApp1\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' ++ echo .svc.cluster.local ++ awk -F: '{print $2}' + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.b4eSzYVC6f +++ mktemp ++ local LAST_ERR=/tmp/tmp.7GjbEvl7L9 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.b4eSzYVC6f ++ cat /tmp/tmp.7GjbEvl7L9 ++ rm /tmp/tmp.b4eSzYVC6f /tmp/tmp.7GjbEvl7L9 ++ return 0 + local client_container=psmdb-client-66f577db5f-62thq + kubectl_bin exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp1\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.aNMMkHX2La ++ mktemp + local LAST_ERR=/tmp/tmp.fqQkFXj8P4 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp1\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.aNMMkHX2La + cat /tmp/tmp.fqQkFXj8P4 + rm /tmp/tmp.aNMMkHX2La /tmp/tmp.fqQkFXj8P4 + return 0 + [[ 0 -eq 0 ]] + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/compare/find-2nd1.json /tmp/tmp.f8pe3qNJC3/find-2nd1 + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-20810 -2nd2 .svc.cluster.local myApp2 test 27019 + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local postfix=-2nd2 + local suffix=.svc.cluster.local + local database=myApp2 + local collection=test + local port=27019 + run_mongos 'use myApp2\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-20810 mongodb .svc.cluster.local '' 27019 + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' + local 'command=use myApp2\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' ++ echo .svc.cluster.local ++ awk -F: '{print $2}' + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Ybl7QtFU4Q +++ mktemp ++ local LAST_ERR=/tmp/tmp.UeMJG2Jgnr ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.Ybl7QtFU4Q ++ cat /tmp/tmp.UeMJG2Jgnr ++ rm /tmp/tmp.Ybl7QtFU4Q /tmp/tmp.UeMJG2Jgnr ++ return 0 + local client_container=psmdb-client-66f577db5f-62thq + kubectl_bin exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp2\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.xbK267ZkFf ++ mktemp + local LAST_ERR=/tmp/tmp.OTauxCmzaQ + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp2\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.xbK267ZkFf + cat /tmp/tmp.OTauxCmzaQ + rm /tmp/tmp.xbK267ZkFf /tmp/tmp.OTauxCmzaQ + return 0 + [[ 0 -eq 0 ]] + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/compare/find-2nd2.json /tmp/tmp.f8pe3qNJC3/find-2nd2 + run_restore backup-azure-blob + local backup_name=backup-azure-blob + /usr/bin/sed -e 's/backupName:/backupName: backup-azure-blob/' + /usr/bin/sed -e 's/name:/name: restore-backup-azure-blob/' + cat /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/conf/restore.yml + kubectl_bin apply -f - ++ mktemp + local LAST_OUT=/tmp/tmp.2tqJKEySez ++ mktemp + local LAST_ERR=/tmp/tmp.2qLNWiNzDQ + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.2tqJKEySez perconaservermongodbrestore.psmdb.percona.com/restore-backup-azure-blob created + cat /tmp/tmp.2qLNWiNzDQ + rm /tmp/tmp.2tqJKEySez /tmp/tmp.2qLNWiNzDQ + return 0 + wait_restore backup-azure-blob some-name + local backup_name=backup-azure-blob + local cluster_name=some-name + local target_state=ready + local wait_cluster_consistency=1 + local wait_time=1780 + local ok_if_ready=0 + set +o xtrace Waiting for the psmdb-restore/restore-backup-azure-blob object to be createdOK Waiting psmdb-restore/restore-backup-azure-blob to reach state "ready" .OK + [[ 1 -eq 1 ]] + wait_cluster_consistency some-name + local cluster_name=some-name + local wait_time=32 + retry=0 + sleep 7 + echo -n 'waiting for cluster readyness' waiting for cluster readyness++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.QRamwTHIjw +++ mktemp ++ local LAST_ERR=/tmp/tmp.sHTOXZfPog ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.QRamwTHIjw ++ cat /tmp/tmp.sHTOXZfPog ++ rm /tmp/tmp.QRamwTHIjw /tmp/tmp.sHTOXZfPog ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 1 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.oqIE93VBNm +++ mktemp ++ local LAST_ERR=/tmp/tmp.S73D1b5Oc6 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.oqIE93VBNm ++ cat /tmp/tmp.S73D1b5Oc6 ++ rm /tmp/tmp.oqIE93VBNm /tmp/tmp.S73D1b5Oc6 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 2 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.IZOCU8lBRV +++ mktemp ++ local LAST_ERR=/tmp/tmp.5bb7DcfysW ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.IZOCU8lBRV ++ cat /tmp/tmp.5bb7DcfysW ++ rm /tmp/tmp.IZOCU8lBRV /tmp/tmp.5bb7DcfysW ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 3 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.sT7KQvyXtM +++ mktemp ++ local LAST_ERR=/tmp/tmp.bnFe3uQXxd ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.sT7KQvyXtM ++ cat /tmp/tmp.bnFe3uQXxd ++ rm /tmp/tmp.sT7KQvyXtM /tmp/tmp.bnFe3uQXxd ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 4 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.D8gUnXBZw8 +++ mktemp ++ local LAST_ERR=/tmp/tmp.qPrDii1tG0 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.D8gUnXBZw8 ++ cat /tmp/tmp.qPrDii1tG0 ++ rm /tmp/tmp.D8gUnXBZw8 /tmp/tmp.qPrDii1tG0 ++ return 0 + [[ ready == \r\e\a\d\y ]] + echo + check_data + local postfix= ++ seq 0 2 + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-20810 '' .svc.cluster.local myApp test 27019 + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local postfix= + local suffix=.svc.cluster.local + local database=myApp + local collection=test + local port=27019 + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' + run_mongos 'use myApp\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-20810 mongodb .svc.cluster.local '' 27019 + local 'command=use myApp\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo ++ echo .svc.cluster.local ++ awk -F: '{print $2}' + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ZlV4Eyjpqd +++ mktemp ++ local LAST_ERR=/tmp/tmp.xExJpd9CHt ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.ZlV4Eyjpqd ++ cat /tmp/tmp.xExJpd9CHt ++ rm /tmp/tmp.ZlV4Eyjpqd /tmp/tmp.xExJpd9CHt ++ return 0 + local client_container=psmdb-client-66f577db5f-62thq + kubectl_bin exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.t1Ud3xY5w6 ++ mktemp + local LAST_ERR=/tmp/tmp.hgdkOIcTVA + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.t1Ud3xY5w6 + cat /tmp/tmp.hgdkOIcTVA + rm /tmp/tmp.t1Ud3xY5w6 /tmp/tmp.hgdkOIcTVA + return 0 + [[ 0 -eq 0 ]] + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/compare/find.json /tmp/tmp.f8pe3qNJC3/find + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-20810 1 .svc.cluster.local myApp1 test 27019 + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local postfix=1 + local suffix=.svc.cluster.local + local database=myApp1 + local collection=test + local port=27019 + run_mongos 'use myApp1\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-20810 mongodb .svc.cluster.local '' 27019 + local 'command=use myApp1\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' ++ echo .svc.cluster.local ++ awk -F: '{print $2}' + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Xocf8yA8t2 +++ mktemp ++ local LAST_ERR=/tmp/tmp.nbZSPyos1I ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.Xocf8yA8t2 ++ cat /tmp/tmp.nbZSPyos1I ++ rm /tmp/tmp.Xocf8yA8t2 /tmp/tmp.nbZSPyos1I ++ return 0 + local client_container=psmdb-client-66f577db5f-62thq + kubectl_bin exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp1\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.gEAOsHOIwX ++ mktemp + local LAST_ERR=/tmp/tmp.qTq5vHSgPT + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp1\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.gEAOsHOIwX + cat /tmp/tmp.qTq5vHSgPT + rm /tmp/tmp.gEAOsHOIwX /tmp/tmp.qTq5vHSgPT + return 0 + [[ 0 -eq 0 ]] + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/compare/find1.json /tmp/tmp.f8pe3qNJC3/find1 + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-20810 2 .svc.cluster.local myApp2 test 27019 + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local postfix=2 + local suffix=.svc.cluster.local + local database=myApp2 + local collection=test + local port=27019 + run_mongos 'use myApp2\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-20810 mongodb .svc.cluster.local '' 27019 + local 'command=use myApp2\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' ++ awk -F: '{print $2}' ++ echo .svc.cluster.local + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.WHrzCjbgLo +++ mktemp ++ local LAST_ERR=/tmp/tmp.NEtWwRDOWH ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.WHrzCjbgLo ++ cat /tmp/tmp.NEtWwRDOWH ++ rm /tmp/tmp.WHrzCjbgLo /tmp/tmp.NEtWwRDOWH ++ return 0 + local client_container=psmdb-client-66f577db5f-62thq + kubectl_bin exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp2\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.mFfrXTLh5A ++ mktemp + local LAST_ERR=/tmp/tmp.EMc4h0WF5y + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp2\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.mFfrXTLh5A + cat /tmp/tmp.EMc4h0WF5y + rm /tmp/tmp.mFfrXTLh5A /tmp/tmp.EMc4h0WF5y + return 0 + [[ 0 -eq 0 ]] + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/compare/find2.json /tmp/tmp.f8pe3qNJC3/find2 + desc 'check backup and restore -- minio' + set +o xtrace ----------------------------------------------------------------------------------- check backup and restore -- minio ----------------------------------------------------------------------------------- ++ get_backup_dest backup-minio ++ local backup_name=backup-minio ++ kubectl_bin get psmdb-backup backup-minio -o 'jsonpath={.status.destination}' ++ sed 's|s3://||' ++ sed 's|azure://||' +++ mktemp ++ sed -e 's/.json$//' ++ local LAST_OUT=/tmp/tmp.y5RUtJJ5De +++ mktemp ++ local LAST_ERR=/tmp/tmp.Ojq5GWhPBp ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb-backup backup-minio -o 'jsonpath={.status.destination}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.y5RUtJJ5De ++ cat /tmp/tmp.Ojq5GWhPBp ++ rm /tmp/tmp.y5RUtJJ5De /tmp/tmp.Ojq5GWhPBp ++ return 0 + backup_dest_minio=operator-testing/2025-05-22T12:39:12Z + retry=0 + kubectl_bin run -i --rm aws-cli --image=perconalab/awscli --restart=Never -- /usr/bin/env AWS_ACCESS_KEY_ID=some-access-key AWS_SECRET_ACCESS_KEY=some-secret-key AWS_DEFAULT_REGION=us-east-1 /usr/bin/aws --endpoint-url http://minio-service:9000 s3 ls s3://operator-testing/2025-05-22T12:39:12Z/rs0/ + grep myApp.test.gz ++ mktemp + local LAST_OUT=/tmp/tmp.gUYJ98jLho ++ mktemp + local LAST_ERR=/tmp/tmp.6cxj8ur72A + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl run -i --rm aws-cli --image=perconalab/awscli --restart=Never -- /usr/bin/env AWS_ACCESS_KEY_ID=some-access-key AWS_SECRET_ACCESS_KEY=some-secret-key AWS_DEFAULT_REGION=us-east-1 /usr/bin/aws --endpoint-url http://minio-service:9000 s3 ls s3://operator-testing/2025-05-22T12:39:12Z/rs0/ + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.gUYJ98jLho + cat /tmp/tmp.6cxj8ur72A + rm /tmp/tmp.gUYJ98jLho /tmp/tmp.6cxj8ur72A + return 0 2025-05-22 12:39:17 55 myApp.test.gz + insert_data_mongos 100501 myApp '' 27019 + local data=100501 + local db_name=myApp + local flags= + local port=27019 + run_mongos 'use myApp\n db.test.insert({ x: 100501 })' myApp:myPass@some-name-mongos.demand-backup-sharded-20810 '' '' '' 27019 + local 'command=use myApp\n db.test.insert({ x: 100501 })' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo ++ echo .svc.cluster.local ++ awk -F: '{print $2}' + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.UtvvBflxJn +++ mktemp ++ local LAST_ERR=/tmp/tmp.yAvKwQVBGs ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.UtvvBflxJn ++ cat /tmp/tmp.yAvKwQVBGs ++ rm /tmp/tmp.UtvvBflxJn /tmp/tmp.yAvKwQVBGs ++ return 0 + local client_container=psmdb-client-66f577db5f-62thq + kubectl_bin exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.xkTjbDnqyB ++ mktemp + local LAST_ERR=/tmp/tmp.bLfxaAUzOC + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.xkTjbDnqyB Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("a23ccab0-d3e5-4d7f-8250-0d214e18b0c9") } Percona Server for MongoDB server version: v7.0.18-11 WARNING: shell and server versions do not match switched to db myApp WriteResult({ "nInserted" : 1 }) bye + cat /tmp/tmp.bLfxaAUzOC + rm /tmp/tmp.xkTjbDnqyB /tmp/tmp.bLfxaAUzOC + return 0 + insert_data_mongos 100501 myApp1 '' 27019 + local data=100501 + local db_name=myApp1 + local flags= + local port=27019 + run_mongos 'use myApp1\n db.test.insert({ x: 100501 })' myApp:myPass@some-name-mongos.demand-backup-sharded-20810 '' '' '' 27019 + local 'command=use myApp1\n db.test.insert({ x: 100501 })' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo ++ echo .svc.cluster.local ++ awk -F: '{print $2}' + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.BhmLYHOb17 +++ mktemp ++ local LAST_ERR=/tmp/tmp.eefAwmD8XO ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.BhmLYHOb17 ++ cat /tmp/tmp.eefAwmD8XO ++ rm /tmp/tmp.BhmLYHOb17 /tmp/tmp.eefAwmD8XO ++ return 0 + local client_container=psmdb-client-66f577db5f-62thq + kubectl_bin exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp1\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.go68Tc4gII ++ mktemp + local LAST_ERR=/tmp/tmp.1pPlHUqeqn + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp1\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.go68Tc4gII Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("734d7967-510a-455b-bae1-f632fabce549") } Percona Server for MongoDB server version: v7.0.18-11 WARNING: shell and server versions do not match switched to db myApp1 WriteResult({ "nInserted" : 1 }) bye + cat /tmp/tmp.1pPlHUqeqn + rm /tmp/tmp.go68Tc4gII /tmp/tmp.1pPlHUqeqn + return 0 + insert_data_mongos 100501 myApp2 '' 27019 + local data=100501 + local db_name=myApp2 + local flags= + local port=27019 + run_mongos 'use myApp2\n db.test.insert({ x: 100501 })' myApp:myPass@some-name-mongos.demand-backup-sharded-20810 '' '' '' 27019 + local 'command=use myApp2\n db.test.insert({ x: 100501 })' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo ++ echo .svc.cluster.local ++ awk -F: '{print $2}' + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.MhxT519kbj +++ mktemp ++ local LAST_ERR=/tmp/tmp.uZdcFCQ8a9 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.MhxT519kbj ++ cat /tmp/tmp.uZdcFCQ8a9 ++ rm /tmp/tmp.MhxT519kbj /tmp/tmp.uZdcFCQ8a9 ++ return 0 + local client_container=psmdb-client-66f577db5f-62thq + kubectl_bin exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp2\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.4wPb5RWfpG ++ mktemp + local LAST_ERR=/tmp/tmp.YxGfWQt0g1 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp2\n db.test.insert({ x: 100501 })\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.4wPb5RWfpG Percona Server for MongoDB shell version v4.4.29-28 connecting to: mongodb://some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin?compressors=disabled&gssapiServiceName=mongodb Implicit session: session { "id" : UUID("c33550b4-7908-431b-8aac-346294b54a61") } Percona Server for MongoDB server version: v7.0.18-11 WARNING: shell and server versions do not match switched to db myApp2 WriteResult({ "nInserted" : 1 }) bye + cat /tmp/tmp.YxGfWQt0g1 + rm /tmp/tmp.4wPb5RWfpG /tmp/tmp.YxGfWQt0g1 + return 0 + check_data -2nd + local postfix=-2nd ++ seq 0 2 + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-20810 -2nd .svc.cluster.local myApp test 27019 + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local postfix=-2nd + local suffix=.svc.cluster.local + local database=myApp + local collection=test + local port=27019 + run_mongos 'use myApp\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-20810 mongodb .svc.cluster.local '' 27019 + local 'command=use myApp\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local driver=mongodb + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' ++ echo .svc.cluster.local ++ awk -F: '{print $2}' + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.UqEVpMvJZS +++ mktemp ++ local LAST_ERR=/tmp/tmp.ORm0NmHmiW ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.UqEVpMvJZS ++ cat /tmp/tmp.ORm0NmHmiW ++ rm /tmp/tmp.UqEVpMvJZS /tmp/tmp.ORm0NmHmiW ++ return 0 + local client_container=psmdb-client-66f577db5f-62thq + kubectl_bin exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.mGWVvHDGOr ++ mktemp + local LAST_ERR=/tmp/tmp.kf0tjgRuZv + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.mGWVvHDGOr + cat /tmp/tmp.kf0tjgRuZv + rm /tmp/tmp.mGWVvHDGOr /tmp/tmp.kf0tjgRuZv + return 0 + [[ 0 -eq 0 ]] + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/compare/find-2nd.json /tmp/tmp.f8pe3qNJC3/find-2nd + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-20810 -2nd1 .svc.cluster.local myApp1 test 27019 + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local postfix=-2nd1 + local suffix=.svc.cluster.local + local database=myApp1 + local collection=test + local port=27019 + run_mongos 'use myApp1\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-20810 mongodb .svc.cluster.local '' 27019 + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + local 'command=use myApp1\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo ++ echo .svc.cluster.local ++ awk -F: '{print $2}' + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.kDONcIFnZS +++ mktemp ++ local LAST_ERR=/tmp/tmp.fBCqYjAeqB ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.kDONcIFnZS ++ cat /tmp/tmp.fBCqYjAeqB ++ rm /tmp/tmp.kDONcIFnZS /tmp/tmp.fBCqYjAeqB ++ return 0 + local client_container=psmdb-client-66f577db5f-62thq + kubectl_bin exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp1\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.kEglgBuy7V ++ mktemp + local LAST_ERR=/tmp/tmp.sJY5BAhITc + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp1\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.kEglgBuy7V + cat /tmp/tmp.sJY5BAhITc + rm /tmp/tmp.kEglgBuy7V /tmp/tmp.sJY5BAhITc + return 0 + [[ 0 -eq 0 ]] + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/compare/find-2nd1.json /tmp/tmp.f8pe3qNJC3/find-2nd1 + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-20810 -2nd2 .svc.cluster.local myApp2 test 27019 + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local postfix=-2nd2 + local suffix=.svc.cluster.local + local database=myApp2 + local collection=test + local port=27019 + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' + run_mongos 'use myApp2\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-20810 mongodb .svc.cluster.local '' 27019 + local 'command=use myApp2\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo ++ echo .svc.cluster.local ++ awk -F: '{print $2}' + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.TS7PFgkvnZ +++ mktemp ++ local LAST_ERR=/tmp/tmp.JkVttI9A6A ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.TS7PFgkvnZ ++ cat /tmp/tmp.JkVttI9A6A ++ rm /tmp/tmp.TS7PFgkvnZ /tmp/tmp.JkVttI9A6A ++ return 0 + local client_container=psmdb-client-66f577db5f-62thq + kubectl_bin exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp2\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.TFrh7ZXwOJ ++ mktemp + local LAST_ERR=/tmp/tmp.dGyu4FHTvW + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp2\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.TFrh7ZXwOJ + cat /tmp/tmp.dGyu4FHTvW + rm /tmp/tmp.TFrh7ZXwOJ /tmp/tmp.dGyu4FHTvW + return 0 + [[ 0 -eq 0 ]] + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/compare/find-2nd2.json /tmp/tmp.f8pe3qNJC3/find-2nd2 + run_restore backup-minio + local backup_name=backup-minio + cat /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/conf/restore.yml + /usr/bin/sed -e 's/name:/name: restore-backup-minio/' + /usr/bin/sed -e 's/backupName:/backupName: backup-minio/' + kubectl_bin apply -f - ++ mktemp + local LAST_OUT=/tmp/tmp.32WQahHjUQ ++ mktemp + local LAST_ERR=/tmp/tmp.OAfKs4f1yW + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl apply -f - + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.32WQahHjUQ perconaservermongodbrestore.psmdb.percona.com/restore-backup-minio created + cat /tmp/tmp.OAfKs4f1yW + rm /tmp/tmp.32WQahHjUQ /tmp/tmp.OAfKs4f1yW + return 0 + wait_restore backup-minio some-name + local backup_name=backup-minio + local cluster_name=some-name + local target_state=ready + local wait_cluster_consistency=1 + local wait_time=1780 + local ok_if_ready=0 + set +o xtrace Waiting for the psmdb-restore/restore-backup-minio object to be createdOK Waiting psmdb-restore/restore-backup-minio to reach state "ready" .OK + [[ 1 -eq 1 ]] + wait_cluster_consistency some-name + local cluster_name=some-name + local wait_time=32 + retry=0 + sleep 7 + echo -n 'waiting for cluster readyness' waiting for cluster readyness++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.T7JD62sSM7 +++ mktemp ++ local LAST_ERR=/tmp/tmp.ZEPkFFDowG ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.T7JD62sSM7 ++ cat /tmp/tmp.ZEPkFFDowG ++ rm /tmp/tmp.T7JD62sSM7 /tmp/tmp.ZEPkFFDowG ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 1 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.CzGbB2tXnh +++ mktemp ++ local LAST_ERR=/tmp/tmp.C66DLu5R92 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.CzGbB2tXnh ++ cat /tmp/tmp.C66DLu5R92 ++ rm /tmp/tmp.CzGbB2tXnh /tmp/tmp.C66DLu5R92 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 2 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.C9aFBkGWBI +++ mktemp ++ local LAST_ERR=/tmp/tmp.P2OXyMm2f3 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.C9aFBkGWBI ++ cat /tmp/tmp.P2OXyMm2f3 ++ rm /tmp/tmp.C9aFBkGWBI /tmp/tmp.P2OXyMm2f3 ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 3 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.b6PqqKrU5h +++ mktemp ++ local LAST_ERR=/tmp/tmp.UCRGSoEt8F ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.b6PqqKrU5h ++ cat /tmp/tmp.UCRGSoEt8F ++ rm /tmp/tmp.b6PqqKrU5h /tmp/tmp.UCRGSoEt8F ++ return 0 + [[ initializing == \r\e\a\d\y ]] + let retry+=1 + '[' 4 -ge 32 ']' + echo -n . .+ sleep 10 ++ kubectl_bin get psmdb some-name -o 'jsonpath={.status.state}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ZGpMloGqo3 +++ mktemp ++ local LAST_ERR=/tmp/tmp.XyyqBawxmY ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb some-name -o 'jsonpath={.status.state}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.ZGpMloGqo3 ++ cat /tmp/tmp.XyyqBawxmY ++ rm /tmp/tmp.ZGpMloGqo3 /tmp/tmp.XyyqBawxmY ++ return 0 + [[ ready == \r\e\a\d\y ]] + echo + check_data + local postfix= ++ seq 0 2 + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-20810 '' .svc.cluster.local myApp test 27019 + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local postfix= + local suffix=.svc.cluster.local + local database=myApp + local collection=test + local port=27019 + run_mongos 'use myApp\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-20810 mongodb .svc.cluster.local '' 27019 + local 'command=use myApp\n db.test.find()' + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' ++ echo .svc.cluster.local ++ awk -F: '{print $2}' + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.zE0JaxEsX9 +++ mktemp ++ local LAST_ERR=/tmp/tmp.R1zxQVsg8S ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.zE0JaxEsX9 ++ cat /tmp/tmp.R1zxQVsg8S ++ rm /tmp/tmp.zE0JaxEsX9 /tmp/tmp.R1zxQVsg8S ++ return 0 + local client_container=psmdb-client-66f577db5f-62thq + kubectl_bin exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.hbyCM8cTbU ++ mktemp + local LAST_ERR=/tmp/tmp.oncvAr2tih + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.hbyCM8cTbU + cat /tmp/tmp.oncvAr2tih + rm /tmp/tmp.hbyCM8cTbU /tmp/tmp.oncvAr2tih + return 0 + [[ 0 -eq 0 ]] + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/compare/find.json /tmp/tmp.f8pe3qNJC3/find + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-20810 1 .svc.cluster.local myApp1 test 27019 + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local postfix=1 + local suffix=.svc.cluster.local + local database=myApp1 + local collection=test + local port=27019 + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' + run_mongos 'use myApp1\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-20810 mongodb .svc.cluster.local '' 27019 + local 'command=use myApp1\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo ++ echo .svc.cluster.local ++ awk -F: '{print $2}' + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.M6B21Ghrmy +++ mktemp ++ local LAST_ERR=/tmp/tmp.oGeiLfhqB4 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.M6B21Ghrmy ++ cat /tmp/tmp.oGeiLfhqB4 ++ rm /tmp/tmp.M6B21Ghrmy /tmp/tmp.oGeiLfhqB4 ++ return 0 + local client_container=psmdb-client-66f577db5f-62thq + kubectl_bin exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp1\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.39uDAj9vGP ++ mktemp + local LAST_ERR=/tmp/tmp.ugyMFSQyUR + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp1\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.39uDAj9vGP + cat /tmp/tmp.ugyMFSQyUR + rm /tmp/tmp.39uDAj9vGP /tmp/tmp.ugyMFSQyUR + return 0 + [[ 0 -eq 0 ]] + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/compare/find1.json /tmp/tmp.f8pe3qNJC3/find1 + for i in '$(seq 0 2)' + compare_mongos_cmd find myApp:myPass@some-name-mongos.demand-backup-sharded-20810 2 .svc.cluster.local myApp2 test 27019 + local command=find + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local postfix=2 + local suffix=.svc.cluster.local + local database=myApp2 + local collection=test + local port=27019 + egrep -v 'I NETWORK|W NETWORK|Error saving history file|Percona Server for MongoDB|connecting to:|Unable to reach primary for set|Implicit session:|versions do not match|Error saving history file:' + /usr/bin/sed -re 's/ObjectId\("[0-9a-f]+"\)//; s/-[0-9]+.svc/-xxx.svc/' + run_mongos 'use myApp2\n db.test.find()' myApp:myPass@some-name-mongos.demand-backup-sharded-20810 mongodb .svc.cluster.local '' 27019 + local 'command=use myApp2\n db.test.find()' + local uri=myApp:myPass@some-name-mongos.demand-backup-sharded-20810 + local driver=mongodb + local suffix=.svc.cluster.local + local mongo_flag= + local port=27019 + local mongo_bin=mongo ++ echo .svc.cluster.local ++ awk -F: '{print $2}' + suffix_port= + [[ -z '' ]] + suffix=.svc.cluster.local:27019 ++ kubectl_bin get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.73p9I3IGIF +++ mktemp ++ local LAST_ERR=/tmp/tmp.1ZAxDcsSLG ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods --selector=name=psmdb-client -o 'jsonpath={.items[].metadata.name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.73p9I3IGIF ++ cat /tmp/tmp.1ZAxDcsSLG ++ rm /tmp/tmp.73p9I3IGIF /tmp/tmp.1ZAxDcsSLG ++ return 0 + local client_container=psmdb-client-66f577db5f-62thq + kubectl_bin exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp2\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' ++ mktemp + local LAST_OUT=/tmp/tmp.XW7NlzDPPY ++ mktemp + local LAST_ERR=/tmp/tmp.C94MAIvuWx + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl exec psmdb-client-66f577db5f-62thq -- bash -c 'printf '\''use myApp2\n db.test.find()\n'\'' | mongo mongodb://myApp:myPass@some-name-mongos.demand-backup-sharded-20810.svc.cluster.local:27019/admin ' + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.XW7NlzDPPY + cat /tmp/tmp.C94MAIvuWx + rm /tmp/tmp.XW7NlzDPPY /tmp/tmp.C94MAIvuWx + return 0 + [[ 0 -eq 0 ]] + diff /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/demand-backup-sharded/compare/find2.json /tmp/tmp.f8pe3qNJC3/find2 + desc 'delete backup and check if it is removed from bucket -- minio' + set +o xtrace ----------------------------------------------------------------------------------- delete backup and check if it is removed from bucket -- minio ----------------------------------------------------------------------------------- + kubectl_bin delete psmdb-backup --all ++ mktemp + local LAST_OUT=/tmp/tmp.CWAb7bpFsr ++ mktemp + local LAST_ERR=/tmp/tmp.VNlOnBRW8H + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete psmdb-backup --all + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.CWAb7bpFsr perconaservermongodbbackup.psmdb.percona.com "backup-aws-s3" deleted perconaservermongodbbackup.psmdb.percona.com "backup-azure-blob" deleted perconaservermongodbbackup.psmdb.percona.com "backup-gcp-cs" deleted perconaservermongodbbackup.psmdb.percona.com "backup-minio" deleted + cat /tmp/tmp.VNlOnBRW8H + rm /tmp/tmp.CWAb7bpFsr /tmp/tmp.VNlOnBRW8H + return 0 ++ grep -c operator-testing/2025-05-22T12:39:12Z_ ++ kubectl_bin run -i --rm aws-cli --image=perconalab/awscli --restart=Never -- /usr/bin/env AWS_ACCESS_KEY_ID=some-access-key AWS_SECRET_ACCESS_KEY=some-secret-key AWS_DEFAULT_REGION=us-east-1 /usr/bin/aws --endpoint-url http://minio-service:9000 s3 ls s3://operator-testing/ ++ cat +++ mktemp ++ local LAST_OUT=/tmp/tmp.AVqx40amyz +++ mktemp ++ local LAST_ERR=/tmp/tmp.fTdJTUrkMG ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl run -i --rm aws-cli --image=perconalab/awscli --restart=Never -- /usr/bin/env AWS_ACCESS_KEY_ID=some-access-key AWS_SECRET_ACCESS_KEY=some-secret-key AWS_DEFAULT_REGION=us-east-1 /usr/bin/aws --endpoint-url http://minio-service:9000 s3 ls s3://operator-testing/ ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.AVqx40amyz ++ cat /tmp/tmp.fTdJTUrkMG ++ rm /tmp/tmp.AVqx40amyz /tmp/tmp.fTdJTUrkMG ++ return 0 + backup_exists=0 + [[ 0 -eq 1 ]] + '[' -z '' ']' + check_backup_deletion https://s3.amazonaws.com/operator-testing/psmdb-demand-backup-sharded/2025-05-22T12:40:17Z aws-s3 + path=https://s3.amazonaws.com/operator-testing/psmdb-demand-backup-sharded/2025-05-22T12:40:17Z + storage_name=aws-s3 + retry=0 ++ curl -sw '%{http_code}' -o /dev/null https://s3.amazonaws.com/operator-testing/psmdb-demand-backup-sharded/2025-05-22T12:40:17Z + [[ 403 -eq 403 ]] + check_backup_deletion https://storage.googleapis.com/operator-testing/psmdb-demand-backup-sharded/2025-05-22T12:39:44Z gcp-cs + path=https://storage.googleapis.com/operator-testing/psmdb-demand-backup-sharded/2025-05-22T12:39:44Z + storage_name=gcp-cs + retry=0 ++ curl -sw '%{http_code}' -o /dev/null https://storage.googleapis.com/operator-testing/psmdb-demand-backup-sharded/2025-05-22T12:39:44Z + [[ 404 -eq 403 ]] ++ curl -sw '%{http_code}' -o /dev/null https://storage.googleapis.com/operator-testing/psmdb-demand-backup-sharded/2025-05-22T12:39:44Z + [[ 404 -eq 404 ]] + check_backup_deletion https://engk8soperators.blob.core.windows.net/operator-testing/psmdb-demand-backup-sharded/2025-05-22T12:40:49Z azure-blob + path=https://engk8soperators.blob.core.windows.net/operator-testing/psmdb-demand-backup-sharded/2025-05-22T12:40:49Z + storage_name=azure-blob + retry=0 ++ curl -sw '%{http_code}' -o /dev/null https://engk8soperators.blob.core.windows.net/operator-testing/psmdb-demand-backup-sharded/2025-05-22T12:40:49Z + [[ 404 -eq 403 ]] ++ curl -sw '%{http_code}' -o /dev/null https://engk8soperators.blob.core.windows.net/operator-testing/psmdb-demand-backup-sharded/2025-05-22T12:40:49Z + [[ 404 -eq 404 ]] + desc 'check for passwords leak' + set +o xtrace ----------------------------------------------------------------------------------- check for passwords leak ----------------------------------------------------------------------------------- + check_passwords_leak + local secrets + local passwords + local pods ++ kubectl_bin get secrets -o json ++ jq -r '.items[].data | to_entries | .[] | select(.key | (contains("_PASSWORD"))) | .value' +++ mktemp ++ local LAST_OUT=/tmp/tmp.fil7G7x069 +++ mktemp ++ local LAST_ERR=/tmp/tmp.P6rPT55bn5 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get secrets -o json ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.fil7G7x069 ++ cat /tmp/tmp.P6rPT55bn5 ++ rm /tmp/tmp.fil7G7x069 /tmp/tmp.P6rPT55bn5 ++ return 0 + secrets='YmFja3VwMTIzNDU2 YmFja3VwMTIzNDU2 Y2x1c3RlckFkbWluMTIzNDU2 Y2x1c3RlckFkbWluMTIzNDU2 Y2x1c3Rlck1vbml0b3IxMjM0NTY= Y2x1c3Rlck1vbml0b3IxMjM0NTY= ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== dXNlckFkbWluMTIzNDU2 dXNlckFkbWluMTIzNDU2 YmFja3VwMTIzNDU2 Y2x1c3RlckFkbWluMTIzNDU2 Y2x1c3Rlck1vbml0b3IxMjM0NTY= ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== dXNlckFkbWluMTIzNDU2' + echo secrets=YmFja3VwMTIzNDU2 YmFja3VwMTIzNDU2 Y2x1c3RlckFkbWluMTIzNDU2 Y2x1c3RlckFkbWluMTIzNDU2 Y2x1c3Rlck1vbml0b3IxMjM0NTY= Y2x1c3Rlck1vbml0b3IxMjM0NTY= ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== dXNlckFkbWluMTIzNDU2 dXNlckFkbWluMTIzNDU2 YmFja3VwMTIzNDU2 Y2x1c3RlckFkbWluMTIzNDU2 Y2x1c3Rlck1vbml0b3IxMjM0NTY= ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== dXNlckFkbWluMTIzNDU2 secrets=YmFja3VwMTIzNDU2 YmFja3VwMTIzNDU2 Y2x1c3RlckFkbWluMTIzNDU2 Y2x1c3RlckFkbWluMTIzNDU2 Y2x1c3Rlck1vbml0b3IxMjM0NTY= Y2x1c3Rlck1vbml0b3IxMjM0NTY= ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== dXNlckFkbWluMTIzNDU2 dXNlckFkbWluMTIzNDU2 YmFja3VwMTIzNDU2 Y2x1c3RlckFkbWluMTIzNDU2 Y2x1c3Rlck1vbml0b3IxMjM0NTY= ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== dXNlckFkbWluMTIzNDU2 ++ for i in '$secrets' ++ base64 -d ++ echo ++ for i in '$secrets' ++ base64 -d ++ echo ++ for i in '$secrets' ++ base64 -d ++ echo ++ for i in '$secrets' ++ base64 -d ++ echo ++ for i in '$secrets' ++ base64 -d ++ echo ++ for i in '$secrets' ++ base64 -d ++ echo ++ for i in '$secrets' ++ base64 -d ++ echo ++ for i in '$secrets' ++ base64 -d ++ echo ++ for i in '$secrets' ++ base64 -d ++ echo ++ for i in '$secrets' ++ base64 -d ++ echo ++ for i in '$secrets' ++ base64 -d ++ echo ++ for i in '$secrets' ++ base64 -d ++ echo ++ for i in '$secrets' ++ base64 -d ++ echo ++ for i in '$secrets' ++ base64 -d ++ echo ++ for i in '$secrets' ++ base64 -d ++ echo + passwords='backup123456 backup123456 clusterAdmin123456 clusterAdmin123456 clusterMonitor123456 clusterMonitor123456 databaseAdmin123456 databaseAdmin123456 userAdmin123456 userAdmin123456 backup123456 clusterAdmin123456 clusterMonitor123456 databaseAdmin123456 userAdmin123456 YmFja3VwMTIzNDU2 YmFja3VwMTIzNDU2 Y2x1c3RlckFkbWluMTIzNDU2 Y2x1c3RlckFkbWluMTIzNDU2 Y2x1c3Rlck1vbml0b3IxMjM0NTY= Y2x1c3Rlck1vbml0b3IxMjM0NTY= ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== dXNlckFkbWluMTIzNDU2 dXNlckFkbWluMTIzNDU2 YmFja3VwMTIzNDU2 Y2x1c3RlckFkbWluMTIzNDU2 Y2x1c3Rlck1vbml0b3IxMjM0NTY= ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== dXNlckFkbWluMTIzNDU2' + echo passwords=backup123456 backup123456 clusterAdmin123456 clusterAdmin123456 clusterMonitor123456 clusterMonitor123456 databaseAdmin123456 databaseAdmin123456 userAdmin123456 userAdmin123456 backup123456 clusterAdmin123456 clusterMonitor123456 databaseAdmin123456 userAdmin123456 YmFja3VwMTIzNDU2 YmFja3VwMTIzNDU2 Y2x1c3RlckFkbWluMTIzNDU2 Y2x1c3RlckFkbWluMTIzNDU2 Y2x1c3Rlck1vbml0b3IxMjM0NTY= Y2x1c3Rlck1vbml0b3IxMjM0NTY= ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== dXNlckFkbWluMTIzNDU2 dXNlckFkbWluMTIzNDU2 YmFja3VwMTIzNDU2 Y2x1c3RlckFkbWluMTIzNDU2 Y2x1c3Rlck1vbml0b3IxMjM0NTY= ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== dXNlckFkbWluMTIzNDU2 passwords=backup123456 backup123456 clusterAdmin123456 clusterAdmin123456 clusterMonitor123456 clusterMonitor123456 databaseAdmin123456 databaseAdmin123456 userAdmin123456 userAdmin123456 backup123456 clusterAdmin123456 clusterMonitor123456 databaseAdmin123456 userAdmin123456 YmFja3VwMTIzNDU2 YmFja3VwMTIzNDU2 Y2x1c3RlckFkbWluMTIzNDU2 Y2x1c3RlckFkbWluMTIzNDU2 Y2x1c3Rlck1vbml0b3IxMjM0NTY= Y2x1c3Rlck1vbml0b3IxMjM0NTY= ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== dXNlckFkbWluMTIzNDU2 dXNlckFkbWluMTIzNDU2 YmFja3VwMTIzNDU2 Y2x1c3RlckFkbWluMTIzNDU2 Y2x1c3Rlck1vbml0b3IxMjM0NTY= ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== dXNlckFkbWluMTIzNDU2 ++ awk -F / '{print $2}' ++ kubectl_bin get pods -o name +++ mktemp ++ local LAST_OUT=/tmp/tmp.3RlzSXOBgq +++ mktemp ++ local LAST_ERR=/tmp/tmp.VjW7kRryRs ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get pods -o name ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.3RlzSXOBgq ++ cat /tmp/tmp.VjW7kRryRs ++ rm /tmp/tmp.3RlzSXOBgq /tmp/tmp.VjW7kRryRs ++ return 0 + pods='minio-service-86dfccd949-sxmvh psmdb-client-66f577db5f-62thq some-name-cfg-0 some-name-cfg-1 some-name-cfg-2 some-name-mongos-0 some-name-mongos-1 some-name-mongos-2 some-name-rs0-0 some-name-rs0-1 some-name-rs0-2 some-name-rs1-0 some-name-rs1-1 some-name-rs1-2 some-name-rs2-0 some-name-rs2-1 some-name-rs2-2' + echo pods=minio-service-86dfccd949-sxmvh psmdb-client-66f577db5f-62thq some-name-cfg-0 some-name-cfg-1 some-name-cfg-2 some-name-mongos-0 some-name-mongos-1 some-name-mongos-2 some-name-rs0-0 some-name-rs0-1 some-name-rs0-2 some-name-rs1-0 some-name-rs1-1 some-name-rs1-2 some-name-rs2-0 some-name-rs2-1 some-name-rs2-2 pods=minio-service-86dfccd949-sxmvh psmdb-client-66f577db5f-62thq some-name-cfg-0 some-name-cfg-1 some-name-cfg-2 some-name-mongos-0 some-name-mongos-1 some-name-mongos-2 some-name-rs0-0 some-name-rs0-1 some-name-rs0-2 some-name-rs1-0 some-name-rs1-1 some-name-rs1-2 some-name-rs2-0 some-name-rs2-1 some-name-rs2-2 + collect_logs demand-backup-sharded-20810 + local containers + local count + NS=demand-backup-sharded-20810 + for p in '$pods' ++ kubectl_bin -n demand-backup-sharded-20810 get pod minio-service-86dfccd949-sxmvh -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.bmFBtaS6RC +++ mktemp ++ local LAST_ERR=/tmp/tmp.yA3x36HmJy ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n demand-backup-sharded-20810 get pod minio-service-86dfccd949-sxmvh -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.bmFBtaS6RC ++ cat /tmp/tmp.yA3x36HmJy ++ rm /tmp/tmp.bmFBtaS6RC /tmp/tmp.yA3x36HmJy ++ return 0 + containers=minio + for c in '$containers' + [[ minio =~ pmm ]] + kubectl_bin -n demand-backup-sharded-20810 logs minio-service-86dfccd949-sxmvh -c minio ++ mktemp + local LAST_OUT=/tmp/tmp.ubU9UMg9rh ++ mktemp + local LAST_ERR=/tmp/tmp.WHbPuOFyH4 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-20810 logs minio-service-86dfccd949-sxmvh -c minio + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.ubU9UMg9rh + cat /tmp/tmp.WHbPuOFyH4 + rm /tmp/tmp.ubU9UMg9rh /tmp/tmp.WHbPuOFyH4 + return 0 + echo logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-minio-service-86dfccd949-sxmvh-minio.txt logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-minio-service-86dfccd949-sxmvh-minio.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-minio-service-86dfccd949-sxmvh-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-minio-service-86dfccd949-sxmvh-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-minio-service-86dfccd949-sxmvh-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-minio-service-86dfccd949-sxmvh-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-minio-service-86dfccd949-sxmvh-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-minio-service-86dfccd949-sxmvh-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-minio-service-86dfccd949-sxmvh-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-minio-service-86dfccd949-sxmvh-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-minio-service-86dfccd949-sxmvh-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-minio-service-86dfccd949-sxmvh-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-minio-service-86dfccd949-sxmvh-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-minio-service-86dfccd949-sxmvh-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-minio-service-86dfccd949-sxmvh-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-minio-service-86dfccd949-sxmvh-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-minio-service-86dfccd949-sxmvh-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-minio-service-86dfccd949-sxmvh-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-minio-service-86dfccd949-sxmvh-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-minio-service-86dfccd949-sxmvh-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-minio-service-86dfccd949-sxmvh-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-minio-service-86dfccd949-sxmvh-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-minio-service-86dfccd949-sxmvh-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-minio-service-86dfccd949-sxmvh-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-minio-service-86dfccd949-sxmvh-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-minio-service-86dfccd949-sxmvh-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-minio-service-86dfccd949-sxmvh-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-minio-service-86dfccd949-sxmvh-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-minio-service-86dfccd949-sxmvh-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-minio-service-86dfccd949-sxmvh-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-minio-service-86dfccd949-sxmvh-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-minio-service-86dfccd949-sxmvh-minio.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' ++ kubectl_bin -n demand-backup-sharded-20810 get pod psmdb-client-66f577db5f-62thq -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ykdNWEzQvo +++ mktemp ++ local LAST_ERR=/tmp/tmp.sjY2Pvdq19 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n demand-backup-sharded-20810 get pod psmdb-client-66f577db5f-62thq -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.ykdNWEzQvo ++ cat /tmp/tmp.sjY2Pvdq19 ++ rm /tmp/tmp.ykdNWEzQvo /tmp/tmp.sjY2Pvdq19 ++ return 0 + containers=psmdb-client + for c in '$containers' + [[ psmdb-client =~ pmm ]] + kubectl_bin -n demand-backup-sharded-20810 logs psmdb-client-66f577db5f-62thq -c psmdb-client ++ mktemp + local LAST_OUT=/tmp/tmp.7SuXUDkFCl ++ mktemp + local LAST_ERR=/tmp/tmp.X4Tld5HOCt + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-20810 logs psmdb-client-66f577db5f-62thq -c psmdb-client + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.7SuXUDkFCl + cat /tmp/tmp.X4Tld5HOCt + rm /tmp/tmp.7SuXUDkFCl /tmp/tmp.X4Tld5HOCt + return 0 + echo logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-psmdb-client-66f577db5f-62thq-psmdb-client.txt logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-psmdb-client-66f577db5f-62thq-psmdb-client.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-psmdb-client-66f577db5f-62thq-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-psmdb-client-66f577db5f-62thq-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-psmdb-client-66f577db5f-62thq-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-psmdb-client-66f577db5f-62thq-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-psmdb-client-66f577db5f-62thq-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-psmdb-client-66f577db5f-62thq-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-psmdb-client-66f577db5f-62thq-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-psmdb-client-66f577db5f-62thq-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-psmdb-client-66f577db5f-62thq-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-psmdb-client-66f577db5f-62thq-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-psmdb-client-66f577db5f-62thq-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-psmdb-client-66f577db5f-62thq-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-psmdb-client-66f577db5f-62thq-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-psmdb-client-66f577db5f-62thq-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-psmdb-client-66f577db5f-62thq-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-psmdb-client-66f577db5f-62thq-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-psmdb-client-66f577db5f-62thq-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-psmdb-client-66f577db5f-62thq-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-psmdb-client-66f577db5f-62thq-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-psmdb-client-66f577db5f-62thq-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-psmdb-client-66f577db5f-62thq-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-psmdb-client-66f577db5f-62thq-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-psmdb-client-66f577db5f-62thq-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-psmdb-client-66f577db5f-62thq-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-psmdb-client-66f577db5f-62thq-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-psmdb-client-66f577db5f-62thq-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-psmdb-client-66f577db5f-62thq-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-psmdb-client-66f577db5f-62thq-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-psmdb-client-66f577db5f-62thq-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-psmdb-client-66f577db5f-62thq-psmdb-client.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' ++ kubectl_bin -n demand-backup-sharded-20810 get pod some-name-cfg-0 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.TEueTvLdhU +++ mktemp ++ local LAST_ERR=/tmp/tmp.tX9fb4Xl8x ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n demand-backup-sharded-20810 get pod some-name-cfg-0 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.TEueTvLdhU ++ cat /tmp/tmp.tX9fb4Xl8x ++ rm /tmp/tmp.TEueTvLdhU /tmp/tmp.tX9fb4Xl8x ++ return 0 + containers='mongod cfg-sidecar-1 backup-agent' + for c in '$containers' + [[ mongod =~ pmm ]] + kubectl_bin -n demand-backup-sharded-20810 logs some-name-cfg-0 -c mongod ++ mktemp + local LAST_OUT=/tmp/tmp.dr3uHcOk01 ++ mktemp + local LAST_ERR=/tmp/tmp.vmzbiZaUFV + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-20810 logs some-name-cfg-0 -c mongod + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.dr3uHcOk01 + cat /tmp/tmp.vmzbiZaUFV + rm /tmp/tmp.dr3uHcOk01 /tmp/tmp.vmzbiZaUFV + return 0 + echo logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-mongod.txt logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-mongod.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ cfg-sidecar-1 =~ pmm ]] + kubectl_bin -n demand-backup-sharded-20810 logs some-name-cfg-0 -c cfg-sidecar-1 ++ mktemp + local LAST_OUT=/tmp/tmp.N7DHshCXT5 ++ mktemp + local LAST_ERR=/tmp/tmp.LPoZAZuqJU + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-20810 logs some-name-cfg-0 -c cfg-sidecar-1 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.N7DHshCXT5 + cat /tmp/tmp.LPoZAZuqJU + rm /tmp/tmp.N7DHshCXT5 /tmp/tmp.LPoZAZuqJU + return 0 + echo logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-cfg-sidecar-1.txt logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-cfg-sidecar-1.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ backup-agent =~ pmm ]] + kubectl_bin -n demand-backup-sharded-20810 logs some-name-cfg-0 -c backup-agent ++ mktemp + local LAST_OUT=/tmp/tmp.2FQXisEUBp ++ mktemp + local LAST_ERR=/tmp/tmp.7GKa982dIV + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-20810 logs some-name-cfg-0 -c backup-agent + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.2FQXisEUBp + cat /tmp/tmp.7GKa982dIV + rm /tmp/tmp.2FQXisEUBp /tmp/tmp.7GKa982dIV + return 0 + echo logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-backup-agent.txt logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-backup-agent.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' ++ kubectl_bin -n demand-backup-sharded-20810 get pod some-name-cfg-1 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.xSVpVeq0H0 +++ mktemp ++ local LAST_ERR=/tmp/tmp.xkPjkNH3mI ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n demand-backup-sharded-20810 get pod some-name-cfg-1 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.xSVpVeq0H0 ++ cat /tmp/tmp.xkPjkNH3mI ++ rm /tmp/tmp.xSVpVeq0H0 /tmp/tmp.xkPjkNH3mI ++ return 0 + containers='mongod cfg-sidecar-1 backup-agent' + for c in '$containers' + [[ mongod =~ pmm ]] + kubectl_bin -n demand-backup-sharded-20810 logs some-name-cfg-1 -c mongod ++ mktemp + local LAST_OUT=/tmp/tmp.n3uCoi1IdK ++ mktemp + local LAST_ERR=/tmp/tmp.PXk9ju4w0T + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-20810 logs some-name-cfg-1 -c mongod + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.n3uCoi1IdK + cat /tmp/tmp.PXk9ju4w0T + rm /tmp/tmp.n3uCoi1IdK /tmp/tmp.PXk9ju4w0T + return 0 + echo logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-mongod.txt logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-mongod.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ cfg-sidecar-1 =~ pmm ]] + kubectl_bin -n demand-backup-sharded-20810 logs some-name-cfg-1 -c cfg-sidecar-1 ++ mktemp + local LAST_OUT=/tmp/tmp.94WGVeniwi ++ mktemp + local LAST_ERR=/tmp/tmp.Qo2WhqDf2K + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-20810 logs some-name-cfg-1 -c cfg-sidecar-1 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.94WGVeniwi + cat /tmp/tmp.Qo2WhqDf2K + rm /tmp/tmp.94WGVeniwi /tmp/tmp.Qo2WhqDf2K + return 0 + echo logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-cfg-sidecar-1.txt logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-cfg-sidecar-1.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ backup-agent =~ pmm ]] + kubectl_bin -n demand-backup-sharded-20810 logs some-name-cfg-1 -c backup-agent ++ mktemp + local LAST_OUT=/tmp/tmp.gsCMkIsY7F ++ mktemp + local LAST_ERR=/tmp/tmp.VsJ7WUxktg + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-20810 logs some-name-cfg-1 -c backup-agent + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.gsCMkIsY7F + cat /tmp/tmp.VsJ7WUxktg + rm /tmp/tmp.gsCMkIsY7F /tmp/tmp.VsJ7WUxktg + return 0 + echo logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-backup-agent.txt logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-backup-agent.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' ++ kubectl_bin -n demand-backup-sharded-20810 get pod some-name-cfg-2 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.05VzhJFhol +++ mktemp ++ local LAST_ERR=/tmp/tmp.9j8arnaBEG ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n demand-backup-sharded-20810 get pod some-name-cfg-2 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.05VzhJFhol ++ cat /tmp/tmp.9j8arnaBEG ++ rm /tmp/tmp.05VzhJFhol /tmp/tmp.9j8arnaBEG ++ return 0 + containers='mongod cfg-sidecar-1 backup-agent' + for c in '$containers' + [[ mongod =~ pmm ]] + kubectl_bin -n demand-backup-sharded-20810 logs some-name-cfg-2 -c mongod ++ mktemp + local LAST_OUT=/tmp/tmp.7OKUcAMWoi ++ mktemp + local LAST_ERR=/tmp/tmp.f9SiSoMnVR + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-20810 logs some-name-cfg-2 -c mongod + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.7OKUcAMWoi + cat /tmp/tmp.f9SiSoMnVR + rm /tmp/tmp.7OKUcAMWoi /tmp/tmp.f9SiSoMnVR + return 0 + echo logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-mongod.txt logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-mongod.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ cfg-sidecar-1 =~ pmm ]] + kubectl_bin -n demand-backup-sharded-20810 logs some-name-cfg-2 -c cfg-sidecar-1 ++ mktemp + local LAST_OUT=/tmp/tmp.QpK8bFtqSv ++ mktemp + local LAST_ERR=/tmp/tmp.20XwaVRXLL + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-20810 logs some-name-cfg-2 -c cfg-sidecar-1 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.QpK8bFtqSv + cat /tmp/tmp.20XwaVRXLL + rm /tmp/tmp.QpK8bFtqSv /tmp/tmp.20XwaVRXLL + return 0 + echo logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-cfg-sidecar-1.txt logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-cfg-sidecar-1.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-cfg-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ backup-agent =~ pmm ]] + kubectl_bin -n demand-backup-sharded-20810 logs some-name-cfg-2 -c backup-agent ++ mktemp + local LAST_OUT=/tmp/tmp.kQIMIVGOxp ++ mktemp + local LAST_ERR=/tmp/tmp.tFo570WE5j + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-20810 logs some-name-cfg-2 -c backup-agent + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.kQIMIVGOxp + cat /tmp/tmp.tFo570WE5j + rm /tmp/tmp.kQIMIVGOxp /tmp/tmp.tFo570WE5j + return 0 + echo logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-backup-agent.txt logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-backup-agent.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-cfg-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' ++ kubectl_bin -n demand-backup-sharded-20810 get pod some-name-mongos-0 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.XevEMjoeoH +++ mktemp ++ local LAST_ERR=/tmp/tmp.PjMkj9r5Od ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n demand-backup-sharded-20810 get pod some-name-mongos-0 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.XevEMjoeoH ++ cat /tmp/tmp.PjMkj9r5Od ++ rm /tmp/tmp.XevEMjoeoH /tmp/tmp.PjMkj9r5Od ++ return 0 + containers='mongos mongos-sidecar-1' + for c in '$containers' + [[ mongos =~ pmm ]] + kubectl_bin -n demand-backup-sharded-20810 logs some-name-mongos-0 -c mongos ++ mktemp + local LAST_OUT=/tmp/tmp.K5oUaL9DuA ++ mktemp + local LAST_ERR=/tmp/tmp.XNlQodw8TO + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-20810 logs some-name-mongos-0 -c mongos + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.K5oUaL9DuA + cat /tmp/tmp.XNlQodw8TO + rm /tmp/tmp.K5oUaL9DuA /tmp/tmp.XNlQodw8TO + return 0 + echo logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos.txt logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ mongos-sidecar-1 =~ pmm ]] + kubectl_bin -n demand-backup-sharded-20810 logs some-name-mongos-0 -c mongos-sidecar-1 ++ mktemp + local LAST_OUT=/tmp/tmp.B825N6oG0Z ++ mktemp + local LAST_ERR=/tmp/tmp.mOx3RXXim2 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-20810 logs some-name-mongos-0 -c mongos-sidecar-1 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.B825N6oG0Z + cat /tmp/tmp.mOx3RXXim2 + rm /tmp/tmp.B825N6oG0Z /tmp/tmp.mOx3RXXim2 + return 0 + echo logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos-sidecar-1.txt logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos-sidecar-1.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-0-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' ++ kubectl_bin -n demand-backup-sharded-20810 get pod some-name-mongos-1 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Dr6t17sB5k +++ mktemp ++ local LAST_ERR=/tmp/tmp.ZkvCc7lSks ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n demand-backup-sharded-20810 get pod some-name-mongos-1 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.Dr6t17sB5k ++ cat /tmp/tmp.ZkvCc7lSks ++ rm /tmp/tmp.Dr6t17sB5k /tmp/tmp.ZkvCc7lSks ++ return 0 + containers='mongos mongos-sidecar-1' + for c in '$containers' + [[ mongos =~ pmm ]] + kubectl_bin -n demand-backup-sharded-20810 logs some-name-mongos-1 -c mongos ++ mktemp + local LAST_OUT=/tmp/tmp.ylBqP33gCJ ++ mktemp + local LAST_ERR=/tmp/tmp.bHWwHIvbrO + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-20810 logs some-name-mongos-1 -c mongos + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.ylBqP33gCJ + cat /tmp/tmp.bHWwHIvbrO + rm /tmp/tmp.ylBqP33gCJ /tmp/tmp.bHWwHIvbrO + return 0 + echo logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos.txt logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ mongos-sidecar-1 =~ pmm ]] + kubectl_bin -n demand-backup-sharded-20810 logs some-name-mongos-1 -c mongos-sidecar-1 ++ mktemp + local LAST_OUT=/tmp/tmp.XKAcD8Yk7N ++ mktemp + local LAST_ERR=/tmp/tmp.M7GjE6b8K1 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-20810 logs some-name-mongos-1 -c mongos-sidecar-1 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.XKAcD8Yk7N + cat /tmp/tmp.M7GjE6b8K1 + rm /tmp/tmp.XKAcD8Yk7N /tmp/tmp.M7GjE6b8K1 + return 0 + echo logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos-sidecar-1.txt logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos-sidecar-1.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-1-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' ++ kubectl_bin -n demand-backup-sharded-20810 get pod some-name-mongos-2 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.L1bmtOJ8iw +++ mktemp ++ local LAST_ERR=/tmp/tmp.inur8H1G0v ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n demand-backup-sharded-20810 get pod some-name-mongos-2 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.L1bmtOJ8iw ++ cat /tmp/tmp.inur8H1G0v ++ rm /tmp/tmp.L1bmtOJ8iw /tmp/tmp.inur8H1G0v ++ return 0 + containers='mongos mongos-sidecar-1' + for c in '$containers' + [[ mongos =~ pmm ]] + kubectl_bin -n demand-backup-sharded-20810 logs some-name-mongos-2 -c mongos ++ mktemp + local LAST_OUT=/tmp/tmp.mKzEtfTccC ++ mktemp + local LAST_ERR=/tmp/tmp.0oXO3gcD7T + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-20810 logs some-name-mongos-2 -c mongos + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.mKzEtfTccC + cat /tmp/tmp.0oXO3gcD7T + rm /tmp/tmp.mKzEtfTccC /tmp/tmp.0oXO3gcD7T + return 0 + echo logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos.txt logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ mongos-sidecar-1 =~ pmm ]] + kubectl_bin -n demand-backup-sharded-20810 logs some-name-mongos-2 -c mongos-sidecar-1 ++ mktemp + local LAST_OUT=/tmp/tmp.rlt1P5XVci ++ mktemp + local LAST_ERR=/tmp/tmp.OJed0PiLNb + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-20810 logs some-name-mongos-2 -c mongos-sidecar-1 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.rlt1P5XVci + cat /tmp/tmp.OJed0PiLNb + rm /tmp/tmp.rlt1P5XVci /tmp/tmp.OJed0PiLNb + return 0 + echo logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos-sidecar-1.txt logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos-sidecar-1.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-mongos-2-mongos-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' ++ kubectl_bin -n demand-backup-sharded-20810 get pod some-name-rs0-0 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.kAIJHmhLHm +++ mktemp ++ local LAST_ERR=/tmp/tmp.0E0zYnVwh9 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n demand-backup-sharded-20810 get pod some-name-rs0-0 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.kAIJHmhLHm ++ cat /tmp/tmp.0E0zYnVwh9 ++ rm /tmp/tmp.kAIJHmhLHm /tmp/tmp.0E0zYnVwh9 ++ return 0 + containers='mongod backup-agent' + for c in '$containers' + [[ mongod =~ pmm ]] + kubectl_bin -n demand-backup-sharded-20810 logs some-name-rs0-0 -c mongod ++ mktemp + local LAST_OUT=/tmp/tmp.SE0lRnsCca ++ mktemp + local LAST_ERR=/tmp/tmp.l5m2wNlg1z + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-20810 logs some-name-rs0-0 -c mongod + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.SE0lRnsCca + cat /tmp/tmp.l5m2wNlg1z + rm /tmp/tmp.SE0lRnsCca /tmp/tmp.l5m2wNlg1z + return 0 + echo logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-mongod.txt logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-mongod.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ backup-agent =~ pmm ]] + kubectl_bin -n demand-backup-sharded-20810 logs some-name-rs0-0 -c backup-agent ++ mktemp + local LAST_OUT=/tmp/tmp.GiRhPq6YX4 ++ mktemp + local LAST_ERR=/tmp/tmp.1Gem6S7L2q + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-20810 logs some-name-rs0-0 -c backup-agent + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.GiRhPq6YX4 + cat /tmp/tmp.1Gem6S7L2q + rm /tmp/tmp.GiRhPq6YX4 /tmp/tmp.1Gem6S7L2q + return 0 + echo logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-backup-agent.txt logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-backup-agent.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' ++ kubectl_bin -n demand-backup-sharded-20810 get pod some-name-rs0-1 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.MrOc48yPRM +++ mktemp ++ local LAST_ERR=/tmp/tmp.82Z7t6vFfD ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n demand-backup-sharded-20810 get pod some-name-rs0-1 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.MrOc48yPRM ++ cat /tmp/tmp.82Z7t6vFfD ++ rm /tmp/tmp.MrOc48yPRM /tmp/tmp.82Z7t6vFfD ++ return 0 + containers='mongod backup-agent' + for c in '$containers' + [[ mongod =~ pmm ]] + kubectl_bin -n demand-backup-sharded-20810 logs some-name-rs0-1 -c mongod ++ mktemp + local LAST_OUT=/tmp/tmp.mVhtzuhFf5 ++ mktemp + local LAST_ERR=/tmp/tmp.O8JvbiJcND + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-20810 logs some-name-rs0-1 -c mongod + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.mVhtzuhFf5 + cat /tmp/tmp.O8JvbiJcND + rm /tmp/tmp.mVhtzuhFf5 /tmp/tmp.O8JvbiJcND + return 0 + echo logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-mongod.txt logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-mongod.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ backup-agent =~ pmm ]] + kubectl_bin -n demand-backup-sharded-20810 logs some-name-rs0-1 -c backup-agent ++ mktemp + local LAST_OUT=/tmp/tmp.PXPeIQgTFW ++ mktemp + local LAST_ERR=/tmp/tmp.9YBcTH819g + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-20810 logs some-name-rs0-1 -c backup-agent + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.PXPeIQgTFW + cat /tmp/tmp.9YBcTH819g + rm /tmp/tmp.PXPeIQgTFW /tmp/tmp.9YBcTH819g + return 0 + echo logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-backup-agent.txt logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-backup-agent.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' ++ kubectl_bin -n demand-backup-sharded-20810 get pod some-name-rs0-2 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.DEXlyLeClx +++ mktemp ++ local LAST_ERR=/tmp/tmp.Gban8alAgc ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n demand-backup-sharded-20810 get pod some-name-rs0-2 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.DEXlyLeClx ++ cat /tmp/tmp.Gban8alAgc ++ rm /tmp/tmp.DEXlyLeClx /tmp/tmp.Gban8alAgc ++ return 0 + containers='mongod backup-agent' + for c in '$containers' + [[ mongod =~ pmm ]] + kubectl_bin -n demand-backup-sharded-20810 logs some-name-rs0-2 -c mongod ++ mktemp + local LAST_OUT=/tmp/tmp.9qLCdKRWQB ++ mktemp + local LAST_ERR=/tmp/tmp.hMk6natkqY + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-20810 logs some-name-rs0-2 -c mongod + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.9qLCdKRWQB + cat /tmp/tmp.hMk6natkqY + rm /tmp/tmp.9qLCdKRWQB /tmp/tmp.hMk6natkqY + return 0 + echo logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-mongod.txt logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-mongod.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ backup-agent =~ pmm ]] + kubectl_bin -n demand-backup-sharded-20810 logs some-name-rs0-2 -c backup-agent ++ mktemp + local LAST_OUT=/tmp/tmp.6cBvHOUVCo ++ mktemp + local LAST_ERR=/tmp/tmp.E9158hXRK4 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-20810 logs some-name-rs0-2 -c backup-agent + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.6cBvHOUVCo + cat /tmp/tmp.E9158hXRK4 + rm /tmp/tmp.6cBvHOUVCo /tmp/tmp.E9158hXRK4 + return 0 + echo logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-backup-agent.txt logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-backup-agent.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs0-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' ++ kubectl_bin -n demand-backup-sharded-20810 get pod some-name-rs1-0 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.oQ0khtDq83 +++ mktemp ++ local LAST_ERR=/tmp/tmp.eVahciv0hI ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n demand-backup-sharded-20810 get pod some-name-rs1-0 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.oQ0khtDq83 ++ cat /tmp/tmp.eVahciv0hI ++ rm /tmp/tmp.oQ0khtDq83 /tmp/tmp.eVahciv0hI ++ return 0 + containers='mongod backup-agent' + for c in '$containers' + [[ mongod =~ pmm ]] + kubectl_bin -n demand-backup-sharded-20810 logs some-name-rs1-0 -c mongod ++ mktemp + local LAST_OUT=/tmp/tmp.odMPut8ZKN ++ mktemp + local LAST_ERR=/tmp/tmp.LFzC7fMhc7 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-20810 logs some-name-rs1-0 -c mongod + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.odMPut8ZKN + cat /tmp/tmp.LFzC7fMhc7 + rm /tmp/tmp.odMPut8ZKN /tmp/tmp.LFzC7fMhc7 + return 0 + echo logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-mongod.txt logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-mongod.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ backup-agent =~ pmm ]] + kubectl_bin -n demand-backup-sharded-20810 logs some-name-rs1-0 -c backup-agent ++ mktemp + local LAST_OUT=/tmp/tmp.DnLJfejQqE ++ mktemp + local LAST_ERR=/tmp/tmp.mndkHTX7o7 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-20810 logs some-name-rs1-0 -c backup-agent + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.DnLJfejQqE + cat /tmp/tmp.mndkHTX7o7 + rm /tmp/tmp.DnLJfejQqE /tmp/tmp.mndkHTX7o7 + return 0 + echo logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-backup-agent.txt logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-backup-agent.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' ++ kubectl_bin -n demand-backup-sharded-20810 get pod some-name-rs1-1 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Xff4Oss5n4 +++ mktemp ++ local LAST_ERR=/tmp/tmp.tAlWq4bOH3 ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n demand-backup-sharded-20810 get pod some-name-rs1-1 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.Xff4Oss5n4 ++ cat /tmp/tmp.tAlWq4bOH3 ++ rm /tmp/tmp.Xff4Oss5n4 /tmp/tmp.tAlWq4bOH3 ++ return 0 + containers='mongod backup-agent' + for c in '$containers' + [[ mongod =~ pmm ]] + kubectl_bin -n demand-backup-sharded-20810 logs some-name-rs1-1 -c mongod ++ mktemp + local LAST_OUT=/tmp/tmp.DKhRuIHeMz ++ mktemp + local LAST_ERR=/tmp/tmp.UBdblokXS4 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-20810 logs some-name-rs1-1 -c mongod + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.DKhRuIHeMz + cat /tmp/tmp.UBdblokXS4 + rm /tmp/tmp.DKhRuIHeMz /tmp/tmp.UBdblokXS4 + return 0 + echo logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-mongod.txt logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-mongod.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ backup-agent =~ pmm ]] + kubectl_bin -n demand-backup-sharded-20810 logs some-name-rs1-1 -c backup-agent ++ mktemp + local LAST_OUT=/tmp/tmp.cmsoDycIVl ++ mktemp + local LAST_ERR=/tmp/tmp.NHH5KkfRHp + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-20810 logs some-name-rs1-1 -c backup-agent + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.cmsoDycIVl + cat /tmp/tmp.NHH5KkfRHp + rm /tmp/tmp.cmsoDycIVl /tmp/tmp.NHH5KkfRHp + return 0 + echo logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-backup-agent.txt logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-backup-agent.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' ++ kubectl_bin -n demand-backup-sharded-20810 get pod some-name-rs1-2 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.ThSVctV3uW +++ mktemp ++ local LAST_ERR=/tmp/tmp.sQG8ULVcDC ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n demand-backup-sharded-20810 get pod some-name-rs1-2 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.ThSVctV3uW ++ cat /tmp/tmp.sQG8ULVcDC ++ rm /tmp/tmp.ThSVctV3uW /tmp/tmp.sQG8ULVcDC ++ return 0 + containers='mongod backup-agent' + for c in '$containers' + [[ mongod =~ pmm ]] + kubectl_bin -n demand-backup-sharded-20810 logs some-name-rs1-2 -c mongod ++ mktemp + local LAST_OUT=/tmp/tmp.5imQ1mYy4F ++ mktemp + local LAST_ERR=/tmp/tmp.g7oERNinGB + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-20810 logs some-name-rs1-2 -c mongod + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.5imQ1mYy4F + cat /tmp/tmp.g7oERNinGB + rm /tmp/tmp.5imQ1mYy4F /tmp/tmp.g7oERNinGB + return 0 + echo logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-mongod.txt logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-mongod.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ backup-agent =~ pmm ]] + kubectl_bin -n demand-backup-sharded-20810 logs some-name-rs1-2 -c backup-agent ++ mktemp + local LAST_OUT=/tmp/tmp.pw7WVovlUs ++ mktemp + local LAST_ERR=/tmp/tmp.epwOGa6TEm + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-20810 logs some-name-rs1-2 -c backup-agent + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.pw7WVovlUs + cat /tmp/tmp.epwOGa6TEm + rm /tmp/tmp.pw7WVovlUs /tmp/tmp.epwOGa6TEm + return 0 + echo logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-backup-agent.txt logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-backup-agent.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs1-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' ++ kubectl_bin -n demand-backup-sharded-20810 get pod some-name-rs2-0 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.Tlnm5fu2KJ +++ mktemp ++ local LAST_ERR=/tmp/tmp.1c9ibUjKXG ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n demand-backup-sharded-20810 get pod some-name-rs2-0 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.Tlnm5fu2KJ ++ cat /tmp/tmp.1c9ibUjKXG ++ rm /tmp/tmp.Tlnm5fu2KJ /tmp/tmp.1c9ibUjKXG ++ return 0 + containers='mongod rs-sidecar-1 backup-agent' + for c in '$containers' + [[ mongod =~ pmm ]] + kubectl_bin -n demand-backup-sharded-20810 logs some-name-rs2-0 -c mongod ++ mktemp + local LAST_OUT=/tmp/tmp.rRhUy4Wsdb ++ mktemp + local LAST_ERR=/tmp/tmp.v1vqThIVA6 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-20810 logs some-name-rs2-0 -c mongod + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.rRhUy4Wsdb + cat /tmp/tmp.v1vqThIVA6 + rm /tmp/tmp.rRhUy4Wsdb /tmp/tmp.v1vqThIVA6 + return 0 + echo logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-mongod.txt logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-mongod.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ rs-sidecar-1 =~ pmm ]] + kubectl_bin -n demand-backup-sharded-20810 logs some-name-rs2-0 -c rs-sidecar-1 ++ mktemp + local LAST_OUT=/tmp/tmp.PYuHPQsDGc ++ mktemp + local LAST_ERR=/tmp/tmp.n9nEUbUCXP + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-20810 logs some-name-rs2-0 -c rs-sidecar-1 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.PYuHPQsDGc + cat /tmp/tmp.n9nEUbUCXP + rm /tmp/tmp.PYuHPQsDGc /tmp/tmp.n9nEUbUCXP + return 0 + echo logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-rs-sidecar-1.txt logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-rs-sidecar-1.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ backup-agent =~ pmm ]] + kubectl_bin -n demand-backup-sharded-20810 logs some-name-rs2-0 -c backup-agent ++ mktemp + local LAST_OUT=/tmp/tmp.V3faXwOlV1 ++ mktemp + local LAST_ERR=/tmp/tmp.Fzp5pStGJy + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-20810 logs some-name-rs2-0 -c backup-agent + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.V3faXwOlV1 + cat /tmp/tmp.Fzp5pStGJy + rm /tmp/tmp.V3faXwOlV1 /tmp/tmp.Fzp5pStGJy + return 0 + echo logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-backup-agent.txt logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-backup-agent.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-0-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' ++ kubectl_bin -n demand-backup-sharded-20810 get pod some-name-rs2-1 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.VtNuc7tXqx +++ mktemp ++ local LAST_ERR=/tmp/tmp.hPw6WOSb4y ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n demand-backup-sharded-20810 get pod some-name-rs2-1 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.VtNuc7tXqx ++ cat /tmp/tmp.hPw6WOSb4y ++ rm /tmp/tmp.VtNuc7tXqx /tmp/tmp.hPw6WOSb4y ++ return 0 + containers='mongod rs-sidecar-1 backup-agent' + for c in '$containers' + [[ mongod =~ pmm ]] + kubectl_bin -n demand-backup-sharded-20810 logs some-name-rs2-1 -c mongod ++ mktemp + local LAST_OUT=/tmp/tmp.hgdA3j5eem ++ mktemp + local LAST_ERR=/tmp/tmp.OkcMU65pV0 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-20810 logs some-name-rs2-1 -c mongod + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.hgdA3j5eem + cat /tmp/tmp.OkcMU65pV0 + rm /tmp/tmp.hgdA3j5eem /tmp/tmp.OkcMU65pV0 + return 0 + echo logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-mongod.txt logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-mongod.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ rs-sidecar-1 =~ pmm ]] + kubectl_bin -n demand-backup-sharded-20810 logs some-name-rs2-1 -c rs-sidecar-1 ++ mktemp + local LAST_OUT=/tmp/tmp.Mit6QjNPcG ++ mktemp + local LAST_ERR=/tmp/tmp.rUR3sWsPla + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-20810 logs some-name-rs2-1 -c rs-sidecar-1 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.Mit6QjNPcG + cat /tmp/tmp.rUR3sWsPla + rm /tmp/tmp.Mit6QjNPcG /tmp/tmp.rUR3sWsPla + return 0 + echo logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-rs-sidecar-1.txt logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-rs-sidecar-1.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ backup-agent =~ pmm ]] + kubectl_bin -n demand-backup-sharded-20810 logs some-name-rs2-1 -c backup-agent ++ mktemp + local LAST_OUT=/tmp/tmp.SehpyFmDTh ++ mktemp + local LAST_ERR=/tmp/tmp.3bw0BjU6T8 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-20810 logs some-name-rs2-1 -c backup-agent + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.SehpyFmDTh + cat /tmp/tmp.3bw0BjU6T8 + rm /tmp/tmp.SehpyFmDTh /tmp/tmp.3bw0BjU6T8 + return 0 + echo logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-backup-agent.txt logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-backup-agent.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-1-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + for p in '$pods' ++ kubectl_bin -n demand-backup-sharded-20810 get pod some-name-rs2-2 -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.cgf8pUQQm1 +++ mktemp ++ local LAST_ERR=/tmp/tmp.swY2dIAqBs ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n demand-backup-sharded-20810 get pod some-name-rs2-2 -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.cgf8pUQQm1 ++ cat /tmp/tmp.swY2dIAqBs ++ rm /tmp/tmp.cgf8pUQQm1 /tmp/tmp.swY2dIAqBs ++ return 0 + containers='mongod rs-sidecar-1 backup-agent' + for c in '$containers' + [[ mongod =~ pmm ]] + kubectl_bin -n demand-backup-sharded-20810 logs some-name-rs2-2 -c mongod ++ mktemp + local LAST_OUT=/tmp/tmp.omq43CovFc ++ mktemp + local LAST_ERR=/tmp/tmp.PF33aMqBE6 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-20810 logs some-name-rs2-2 -c mongod + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.omq43CovFc + cat /tmp/tmp.PF33aMqBE6 + rm /tmp/tmp.omq43CovFc /tmp/tmp.PF33aMqBE6 + return 0 + echo logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-mongod.txt logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-mongod.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-mongod.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ rs-sidecar-1 =~ pmm ]] + kubectl_bin -n demand-backup-sharded-20810 logs some-name-rs2-2 -c rs-sidecar-1 ++ mktemp + local LAST_OUT=/tmp/tmp.wJGydX9pNJ ++ mktemp + local LAST_ERR=/tmp/tmp.S4Jj5CdpLb + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-20810 logs some-name-rs2-2 -c rs-sidecar-1 + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.wJGydX9pNJ + cat /tmp/tmp.S4Jj5CdpLb + rm /tmp/tmp.wJGydX9pNJ /tmp/tmp.S4Jj5CdpLb + return 0 + echo logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-rs-sidecar-1.txt logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-rs-sidecar-1.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-rs-sidecar-1.txt ++ : + count=0 + [[ 0 != 0 ]] + for c in '$containers' + [[ backup-agent =~ pmm ]] + kubectl_bin -n demand-backup-sharded-20810 logs some-name-rs2-2 -c backup-agent ++ mktemp + local LAST_OUT=/tmp/tmp.Z7D82ju6a3 ++ mktemp + local LAST_ERR=/tmp/tmp.23dxFxnsYt + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n demand-backup-sharded-20810 logs some-name-rs2-2 -c backup-agent + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.Z7D82ju6a3 + cat /tmp/tmp.23dxFxnsYt + rm /tmp/tmp.Z7D82ju6a3 /tmp/tmp.23dxFxnsYt + return 0 + echo logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-backup-agent.txt logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-backup-agent.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-some-name-rs2-2-backup-agent.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + '[' -n psmdb-operator ']' ++ kubectl_bin -n psmdb-operator get pods -o name ++ awk -F / '{print $2}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.EGUA3gJiEA +++ mktemp ++ local LAST_ERR=/tmp/tmp.zOHNscEGPb ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n psmdb-operator get pods -o name ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.EGUA3gJiEA ++ cat /tmp/tmp.zOHNscEGPb ++ rm /tmp/tmp.EGUA3gJiEA /tmp/tmp.zOHNscEGPb ++ return 0 + pods=percona-server-mongodb-operator-599774bb4f-flsgc + collect_logs psmdb-operator + local containers + local count + NS=psmdb-operator + for p in '$pods' ++ kubectl_bin -n psmdb-operator get pod percona-server-mongodb-operator-599774bb4f-flsgc -o 'jsonpath={.spec.containers[*].name}' +++ mktemp ++ local LAST_OUT=/tmp/tmp.jsvHx2T1ge +++ mktemp ++ local LAST_ERR=/tmp/tmp.Pg9liXYT6I ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl -n psmdb-operator get pod percona-server-mongodb-operator-599774bb4f-flsgc -o 'jsonpath={.spec.containers[*].name}' ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.jsvHx2T1ge ++ cat /tmp/tmp.Pg9liXYT6I ++ rm /tmp/tmp.jsvHx2T1ge /tmp/tmp.Pg9liXYT6I ++ return 0 + containers=percona-server-mongodb-operator + for c in '$containers' + [[ percona-server-mongodb-operator =~ pmm ]] + kubectl_bin -n psmdb-operator logs percona-server-mongodb-operator-599774bb4f-flsgc -c percona-server-mongodb-operator ++ mktemp + local LAST_OUT=/tmp/tmp.QUgyZARP3q ++ mktemp + local LAST_ERR=/tmp/tmp.FOCxKsqDNt + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl -n psmdb-operator logs percona-server-mongodb-operator-599774bb4f-flsgc -c percona-server-mongodb-operator + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.QUgyZARP3q + cat /tmp/tmp.FOCxKsqDNt + rm /tmp/tmp.QUgyZARP3q /tmp/tmp.FOCxKsqDNt + return 0 + echo logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-percona-server-mongodb-operator-599774bb4f-flsgc-percona-server-mongodb-operator.txt logs saved in: /tmp/tmp.f8pe3qNJC3/logs_output-percona-server-mongodb-operator-599774bb4f-flsgc-percona-server-mongodb-operator.txt + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-percona-server-mongodb-operator-599774bb4f-flsgc-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-percona-server-mongodb-operator-599774bb4f-flsgc-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-percona-server-mongodb-operator-599774bb4f-flsgc-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-percona-server-mongodb-operator-599774bb4f-flsgc-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-percona-server-mongodb-operator-599774bb4f-flsgc-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-percona-server-mongodb-operator-599774bb4f-flsgc-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-percona-server-mongodb-operator-599774bb4f-flsgc-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-percona-server-mongodb-operator-599774bb4f-flsgc-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-percona-server-mongodb-operator-599774bb4f-flsgc-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-percona-server-mongodb-operator-599774bb4f-flsgc-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- backup123456 /tmp/tmp.f8pe3qNJC3/logs_output-percona-server-mongodb-operator-599774bb4f-flsgc-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-percona-server-mongodb-operator-599774bb4f-flsgc-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- clusterMonitor123456 /tmp/tmp.f8pe3qNJC3/logs_output-percona-server-mongodb-operator-599774bb4f-flsgc-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- databaseAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-percona-server-mongodb-operator-599774bb4f-flsgc-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- userAdmin123456 /tmp/tmp.f8pe3qNJC3/logs_output-percona-server-mongodb-operator-599774bb4f-flsgc-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-percona-server-mongodb-operator-599774bb4f-flsgc-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-percona-server-mongodb-operator-599774bb4f-flsgc-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-percona-server-mongodb-operator-599774bb4f-flsgc-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-percona-server-mongodb-operator-599774bb4f-flsgc-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-percona-server-mongodb-operator-599774bb4f-flsgc-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-percona-server-mongodb-operator-599774bb4f-flsgc-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-percona-server-mongodb-operator-599774bb4f-flsgc-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-percona-server-mongodb-operator-599774bb4f-flsgc-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-percona-server-mongodb-operator-599774bb4f-flsgc-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-percona-server-mongodb-operator-599774bb4f-flsgc-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- YmFja3VwMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-percona-server-mongodb-operator-599774bb4f-flsgc-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3RlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-percona-server-mongodb-operator-599774bb4f-flsgc-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- Y2x1c3Rlck1vbml0b3IxMjM0NTY= /tmp/tmp.f8pe3qNJC3/logs_output-percona-server-mongodb-operator-599774bb4f-flsgc-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- ZGF0YWJhc2VBZG1pbjEyMzQ1Ng== /tmp/tmp.f8pe3qNJC3/logs_output-percona-server-mongodb-operator-599774bb4f-flsgc-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + for pass in '$passwords' ++ grep -c --fixed-strings -- dXNlckFkbWluMTIzNDU2 /tmp/tmp.f8pe3qNJC3/logs_output-percona-server-mongodb-operator-599774bb4f-flsgc-percona-server-mongodb-operator.txt ++ : + count=0 + [[ 0 != 0 ]] + echo + kubectl_bin delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/conf/container-rc.yaml ++ mktemp + local LAST_OUT=/tmp/tmp.XrBeIk2pJr ++ mktemp + local LAST_ERR=/tmp/tmp.g2nGNkK2Uc + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/e2e-tests/conf/container-rc.yaml + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.XrBeIk2pJr runtimeclass.node.k8s.io "container-rc" deleted + cat /tmp/tmp.g2nGNkK2Uc + rm /tmp/tmp.XrBeIk2pJr /tmp/tmp.g2nGNkK2Uc + return 0 + destroy demand-backup-sharded-20810 + local namespace=demand-backup-sharded-20810 + local ignore_logs=true + desc 'destroy cluster/operator and all other resources' + set +o xtrace ----------------------------------------------------------------------------------- destroy cluster/operator and all other resources ----------------------------------------------------------------------------------- + '[' true == false ']' + delete_backups + desc 'Delete psmdb-backup' + set +o xtrace ----------------------------------------------------------------------------------- Delete psmdb-backup ----------------------------------------------------------------------------------- ++ kubectl_bin get psmdb-backup --no-headers ++ wc -l +++ mktemp ++ local LAST_OUT=/tmp/tmp.UVSO8ZwHQ1 +++ mktemp ++ local LAST_ERR=/tmp/tmp.EwoZm7Iuue ++ local exit_status=0 ++ local timeout=4 +++ seq 0 2 ++ for i in '$(seq 0 2)' ++ set +e ++ kubectl get psmdb-backup --no-headers ++ exit_status=0 ++ set -e ++ '[' 0 '!=' 0 -a -n 1 ']' ++ break ++ cat /tmp/tmp.UVSO8ZwHQ1 ++ cat /tmp/tmp.EwoZm7Iuue No resources found in demand-backup-sharded-20810 namespace. ++ rm /tmp/tmp.UVSO8ZwHQ1 /tmp/tmp.EwoZm7Iuue ++ return 0 + '[' 0 '!=' 0 ']' + delete_crd + desc 'get and delete old CRDs and RBAC' + set +o xtrace ----------------------------------------------------------------------------------- get and delete old CRDs and RBAC ----------------------------------------------------------------------------------- + kubectl_bin delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/deploy/crd.yaml --ignore-not-found --wait=false ++ mktemp + local LAST_OUT=/tmp/tmp.sl8hCyxQQg ++ mktemp + local LAST_ERR=/tmp/tmp.GAemI4Bops + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/deploy/crd.yaml --ignore-not-found --wait=false + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.sl8hCyxQQg customresourcedefinition.apiextensions.k8s.io "perconaservermongodbbackups.psmdb.percona.com" deleted customresourcedefinition.apiextensions.k8s.io "perconaservermongodbrestores.psmdb.percona.com" deleted customresourcedefinition.apiextensions.k8s.io "perconaservermongodbs.psmdb.percona.com" deleted + cat /tmp/tmp.GAemI4Bops + rm /tmp/tmp.sl8hCyxQQg /tmp/tmp.GAemI4Bops + return 0 ++ yq eval .metadata.name /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/deploy/crd.yaml ++ grep -v '\-\-\-' + for crd_name in '$(yq eval '\''.metadata.name'\'' "${src_dir}/deploy/crd.yaml" | grep -v '\''\-\-\-'\'')' + grep -v NAMESPACE + kubectl get perconaservermongodbbackups.psmdb.percona.com --all-namespaces -o wide + xargs -L 1 sh -xc 'kubectl patch perconaservermongodbbackups.psmdb.percona.com -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' error: the server doesn't have a resource type "perconaservermongodbbackups" + kubectl patch perconaservermongodbbackups.psmdb.percona.com -n sh --type=merge -p '{"metadata":{"finalizers":[]}}' error: the server doesn't have a resource type "perconaservermongodbbackups" + : + kubectl_bin wait --for=delete crd perconaservermongodbbackups.psmdb.percona.com ++ mktemp + local LAST_OUT=/tmp/tmp.lRPbDVKix5 ++ mktemp + local LAST_ERR=/tmp/tmp.1vMNiejftn + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=delete crd perconaservermongodbbackups.psmdb.percona.com + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.lRPbDVKix5 + cat /tmp/tmp.1vMNiejftn + rm /tmp/tmp.lRPbDVKix5 /tmp/tmp.1vMNiejftn + return 0 + for crd_name in '$(yq eval '\''.metadata.name'\'' "${src_dir}/deploy/crd.yaml" | grep -v '\''\-\-\-'\'')' + kubectl get perconaservermongodbrestores.psmdb.percona.com --all-namespaces -o wide + xargs -L 1 sh -xc 'kubectl patch perconaservermongodbrestores.psmdb.percona.com -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' + grep -v NAMESPACE error: the server doesn't have a resource type "perconaservermongodbrestores" + kubectl patch perconaservermongodbrestores.psmdb.percona.com -n sh --type=merge -p '{"metadata":{"finalizers":[]}}' error: the server doesn't have a resource type "perconaservermongodbrestores" + : + kubectl_bin wait --for=delete crd perconaservermongodbrestores.psmdb.percona.com ++ mktemp + local LAST_OUT=/tmp/tmp.30wXXNKoPf ++ mktemp + local LAST_ERR=/tmp/tmp.u678rKWyCg + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=delete crd perconaservermongodbrestores.psmdb.percona.com + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.30wXXNKoPf + cat /tmp/tmp.u678rKWyCg + rm /tmp/tmp.30wXXNKoPf /tmp/tmp.u678rKWyCg + return 0 + for crd_name in '$(yq eval '\''.metadata.name'\'' "${src_dir}/deploy/crd.yaml" | grep -v '\''\-\-\-'\'')' + kubectl get perconaservermongodbs.psmdb.percona.com --all-namespaces -o wide + grep -v NAMESPACE + xargs -L 1 sh -xc 'kubectl patch perconaservermongodbs.psmdb.percona.com -n $0 $1 --type=merge -p "{\"metadata\":{\"finalizers\":[]}}"' error: the server doesn't have a resource type "perconaservermongodbs" + kubectl patch perconaservermongodbs.psmdb.percona.com -n sh --type=merge -p '{"metadata":{"finalizers":[]}}' error: the server doesn't have a resource type "perconaservermongodbs" + : + kubectl_bin wait --for=delete crd perconaservermongodbs.psmdb.percona.com ++ mktemp + local LAST_OUT=/tmp/tmp.9tis6lyny0 ++ mktemp + local LAST_ERR=/tmp/tmp.vzEQH12Qh9 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl wait --for=delete crd perconaservermongodbs.psmdb.percona.com + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.9tis6lyny0 + cat /tmp/tmp.vzEQH12Qh9 + rm /tmp/tmp.9tis6lyny0 /tmp/tmp.vzEQH12Qh9 + return 0 + local rbac_yaml=rbac.yaml + '[' -n psmdb-operator ']' + rbac_yaml=cw-rbac.yaml + kubectl_bin delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/deploy/cw-rbac.yaml --ignore-not-found ++ mktemp + local LAST_OUT=/tmp/tmp.XCJHAIADD0 ++ mktemp + local LAST_ERR=/tmp/tmp.sizEvqOHhm + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete -f /mnt/jenkins/workspace/cloud-psmdb-operator_PR-1912/deploy/cw-rbac.yaml --ignore-not-found + exit_status=0 + set -e + '[' 0 '!=' 0 -a -n 1 ']' + break + cat /tmp/tmp.XCJHAIADD0 clusterrole.rbac.authorization.k8s.io "percona-server-mongodb-operator" deleted clusterrolebinding.rbac.authorization.k8s.io "service-account-percona-server-mongodb-operator" deleted + cat /tmp/tmp.sizEvqOHhm + rm /tmp/tmp.XCJHAIADD0 /tmp/tmp.sizEvqOHhm + return 0 + destroy_cert_manager + kubectl_bin delete -f https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml ++ mktemp + local LAST_OUT=/tmp/tmp.uVhH1AChmy ++ mktemp + local LAST_ERR=/tmp/tmp.EqvZrVLVF6 + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete -f https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml + exit_status=1 + set -e + '[' 1 '!=' 0 -a -n 1 ']' + cat /tmp/tmp.uVhH1AChmy + cat /tmp/tmp.EqvZrVLVF6 Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": namespaces "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "certificaterequests.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "certificates.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "challenges.acme.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "clusterissuers.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "issuers.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "orders.acme.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": serviceaccounts "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": serviceaccounts "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": serviceaccounts "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-issuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-clusterissuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-certificates" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-orders" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-challenges" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-ingress-shim" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-cluster-view" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-view" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-edit" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-approve:cert-manager-io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-certificatesigningrequests" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-webhook:subjectaccessreviews" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-issuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-clusterissuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-certificates" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-orders" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-challenges" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-ingress-shim" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-approve:cert-manager-io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-certificatesigningrequests" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-webhook:subjectaccessreviews" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager-cainjector:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager-tokenrequest" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager-webhook:dynamic-serving" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager-cainjector:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager-cert-manager-tokenrequest" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager-webhook:dynamic-serving" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": services "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": services "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": services "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": deployments.apps "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": deployments.apps "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": deployments.apps "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": mutatingwebhookconfigurations.admissionregistration.k8s.io "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": validatingwebhookconfigurations.admissionregistration.k8s.io "cert-manager-webhook" not found + sleep 0 + for i in '$(seq 0 2)' + set +e + kubectl delete -f https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml + exit_status=1 + set -e + '[' 1 '!=' 0 -a -n 1 ']' + cat /tmp/tmp.uVhH1AChmy + cat /tmp/tmp.EqvZrVLVF6 Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": namespaces "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "certificaterequests.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "certificates.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "challenges.acme.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "clusterissuers.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "issuers.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "orders.acme.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": serviceaccounts "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": serviceaccounts "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": serviceaccounts "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-issuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-clusterissuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-certificates" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-orders" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-challenges" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-ingress-shim" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-cluster-view" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-view" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-edit" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-approve:cert-manager-io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-certificatesigningrequests" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-webhook:subjectaccessreviews" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-issuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-clusterissuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-certificates" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-orders" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-challenges" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-ingress-shim" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-approve:cert-manager-io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-certificatesigningrequests" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-webhook:subjectaccessreviews" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager-cainjector:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager-tokenrequest" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager-webhook:dynamic-serving" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager-cainjector:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager-cert-manager-tokenrequest" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager-webhook:dynamic-serving" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": services "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": services "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": services "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": deployments.apps "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": deployments.apps "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": deployments.apps "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": mutatingwebhookconfigurations.admissionregistration.k8s.io "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": validatingwebhookconfigurations.admissionregistration.k8s.io "cert-manager-webhook" not found + sleep 4 + for i in '$(seq 0 2)' + set +e + kubectl delete -f https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml + exit_status=1 + set -e + '[' 1 '!=' 0 -a -n 1 ']' + cat /tmp/tmp.uVhH1AChmy + cat /tmp/tmp.EqvZrVLVF6 Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": namespaces "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "certificaterequests.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "certificates.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "challenges.acme.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "clusterissuers.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "issuers.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "orders.acme.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": serviceaccounts "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": serviceaccounts "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": serviceaccounts "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-issuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-clusterissuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-certificates" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-orders" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-challenges" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-ingress-shim" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-cluster-view" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-view" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-edit" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-approve:cert-manager-io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-certificatesigningrequests" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-webhook:subjectaccessreviews" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-issuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-clusterissuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-certificates" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-orders" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-challenges" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-ingress-shim" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-approve:cert-manager-io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-certificatesigningrequests" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-webhook:subjectaccessreviews" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager-cainjector:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager-tokenrequest" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager-webhook:dynamic-serving" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager-cainjector:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager-cert-manager-tokenrequest" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager-webhook:dynamic-serving" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": services "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": services "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": services "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": deployments.apps "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": deployments.apps "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": deployments.apps "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": mutatingwebhookconfigurations.admissionregistration.k8s.io "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": validatingwebhookconfigurations.admissionregistration.k8s.io "cert-manager-webhook" not found + sleep 8 + cat /tmp/tmp.uVhH1AChmy + cat /tmp/tmp.EqvZrVLVF6 Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": namespaces "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "certificaterequests.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "certificates.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "challenges.acme.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "clusterissuers.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "issuers.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": customresourcedefinitions.apiextensions.k8s.io "orders.acme.cert-manager.io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": serviceaccounts "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": serviceaccounts "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": serviceaccounts "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-issuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-clusterissuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-certificates" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-orders" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-challenges" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-ingress-shim" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-cluster-view" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-view" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-edit" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-approve:cert-manager-io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-controller-certificatesigningrequests" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterroles.rbac.authorization.k8s.io "cert-manager-webhook:subjectaccessreviews" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-issuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-clusterissuers" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-certificates" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-orders" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-challenges" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-ingress-shim" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-approve:cert-manager-io" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-controller-certificatesigningrequests" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": clusterrolebindings.rbac.authorization.k8s.io "cert-manager-webhook:subjectaccessreviews" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager-cainjector:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager-tokenrequest" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": roles.rbac.authorization.k8s.io "cert-manager-webhook:dynamic-serving" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager-cainjector:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager:leaderelection" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager-cert-manager-tokenrequest" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": rolebindings.rbac.authorization.k8s.io "cert-manager-webhook:dynamic-serving" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": services "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": services "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": services "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": deployments.apps "cert-manager-cainjector" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": deployments.apps "cert-manager" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": deployments.apps "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": mutatingwebhookconfigurations.admissionregistration.k8s.io "cert-manager-webhook" not found Error from server (NotFound): error when deleting "https://github.com/cert-manager/cert-manager/releases/download/v1.17.2/cert-manager.yaml": validatingwebhookconfigurations.admissionregistration.k8s.io "cert-manager-webhook" not found + rm /tmp/tmp.uVhH1AChmy /tmp/tmp.EqvZrVLVF6 + return 1 + true + '[' -n '' ']' + '[' -n psmdb-operator ']' + kubectl_bin delete --grace-period=0 --force=true namespace demand-backup-sharded-20810 + rm -rf /tmp/tmp.f8pe3qNJC3 + kubectl_bin delete --grace-period=0 --force=true namespace psmdb-operator ++ mktemp ++ mktemp + local LAST_OUT=/tmp/tmp.kYojz3rO71 ++ mktemp + local LAST_OUT=/tmp/tmp.AZOT1DhrQS + local LAST_ERR=/tmp/tmp.zGja8dHtZS + local exit_status=0 + local timeout=4 ++ mktemp + local LAST_ERR=/tmp/tmp.ZZr8g9U6xm + local exit_status=0 + local timeout=4 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete --grace-period=0 --force=true namespace demand-backup-sharded-20810 ++ seq 0 2 + for i in '$(seq 0 2)' + set +e + kubectl delete --grace-period=0 --force=true namespace psmdb-operator